Software Application Vulnerabilities and Controls

1967 Words4 Pages

Insecure coding practices used by application developers can lead to the creation of vulnerabilities in programs. This fact of life lies at the core of all software vulnerabilities. Until secure coding practices are implemented across the board at all organizations and firms, these flaws will continue to perpetuate vulnerabilities to be exploited. Three of the most common and damaging attacks allowed by the potential vulnerabilities are buffer overflows, including stack overflows and heap/BSS/data overflows, and format string attacks.

Stack buffer overflows are very popular among hackers because they are one of the easier exploits to pull off and they offer the best payoff. The vulnerability allows an attacker to input data past the limitation of a variable, which allows it to be written into adjacent locations in memory. Once this data has been written, the attacker triggers a method for calling that memory location and executing the code. The results can range from crashing the application to remotely executing code, which generates a shell back to the attacker.

There are many tools available to attackers that will allow them exploit potential stack buffer overflow vulnerabilities in remote systems, but these can often be fragmented across many platforms and require significant reworking of code to make them functional. Perhaps the best tool available on the internet to centralize the transmission of these exploits, and many others, is the Metasploit Framework. An example of this will be the easyftp_list.rb exploit that targets EasyFTP Server versions 1.7.0.11 and below. “EasyFTP fails to check input size when parsing the 'path' parameter supplied to an HTTP GET request, which leads to a stack based buffer overflow” (Metasplo...

... middle of paper ...

...he simulated attackers with the source code of the application. While this goes a step further than what a real-world attacker would have access to, it provides a significantly more thorough review of the code.

Works Cited

Abysssec Security Research. (2010 May 8). Past, Present, Future of Windows Exploitation. Retrieved March 8, 2011 from http://www.abysssec.com/blog/2010/05/past-present-future-of-windows-exploitation/

Metasploit. (2010 August 17). EasyFTP Server <= 1.7.0.11 list.html path Stack Buffer Overflow. Retrieved March 14, 2010 from http://www.exploit-db.com/exploits/16771/

McClure, S, Scambray, J, & Kurtz, G. (2009). Hacking exposed 6: network security secrets & solutions. McGraw-Hill Osborne Media.

Wichers, Dave. (2010 October 16). OWASP Top 10 – 2010. Retrieved March 8, 2011 from https://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf

More about Software Application Vulnerabilities and Controls

Open Document