Outline for January 16, 2002
Greetings and Felicitations!
Homework turn-in directory had a problem; if submitted before 8PM on Sunday, please resubmit
Puzzle of the day
Common Implementation Vulnerabilities
Unknown interaction with other system components (DNS entry with bad names, assuming finger port is finger and not chargen)
Overflow (year 2000, lpr overwriting flaw, sendmail large integer flaw, su buffer overflow)
Race conditions (xterm flaw, ps flaw)
Environment variables (vi one-upsmanship, loadmodule)
Not resetting privileges (Purdue Games incident)
Vulnerability Models
PA model
RISOS
NSA
PA Model (Neumann's organization)
Improper protection (initialization and enforcement)
improper choice of initial protection domain
improper isolation of implementation detail
improper change
improper naming
improper deallocation or deletion
Improper validation
Improper synchronization;
improper indivisibility
improper sequencing
Improper choice of operand or operation
RISOS
Incomplete parameter validation
Inconsistent parameter validation
Implicit sharing of privileged/confidential data
Asynchronous validation/Inadequate serialization
Inadequate identification/authentication/authorization
Violable prohibition/limit
Exploitable logic error
Comparison and Problems
Levels of abstraction
Point of view
ECS 153, Introduction to Computer Security
Winter Quarter 2002
Email:
[email protected]