Security Holes – Part 1

Technically, ‘Vulnerability’ is a cyber-security term that refers to a flaw in a system that can leave it open to attacks. In terms of computing, a resource (either physical or logical) may have one or more vulnerabilities that can be exploited by a threat agent in a threat action. The result can potentially compromise the confidentiality, integrity or availability of resources belonging to an organization.

Vulnerability can exist if the system has a security flaw, an attacker has access to the flaw, and the attacker has the capability to exploit the flaw. Then comes into picture what is called a ‘Security hole’. Security holes/bugs are faults, defects, or programming errors. It is often referred to as ‘an attack surface’ in a system.

At Calsoft, we follow our internal coding conventions and practices to keep security violations at bay. These conventions are designed and managed by a highly experience team of experts that continuously thrive to making it better with each day.

We also use well known utilities like Visual Studio’s Static Code verifier and Memory checking and API call validation tools like BoundsChecker, etc. Besides that we conduct thorough cross code reviews and code explanation sessions that highlight many more defects, even design level defects.

In this post, we will elaborate on:

  • Buffer Overflow
  • SQL Injection

Buffer Overflow
Buffer overflows have been the most common form of security vulnerability. A buffer is said to be overflown when the data (meant to be written into memory buffer) gets written past the left or the right boundary of the buffer. This way the data gets written to a portion of memory which does not belong to the program variable that references the buffer.

Causes

  • Incorrect use of buffer/string handling functions
  • Incorrect arithmetic calculations with remaining buffer size,
    especially in memory allocated on the heap

Redemption

  • If you’re making an assumption, make sure you enforce it
  • Use the Cch version of strsafe functions
  • Use C++ string and container classes wherever possible

SQL Injection

A SQL Injection attack is a form of attack that comes from user input that has not been checked to see that
it is valid. The objective of the attacker is to inject their own SQL into the statement that the application will use to query the database.

Causes

  • Failing to check input validity
  • Unsafe usage of string concatenation in building the SQL query

Redemption

  • Filter any unallowable characters like ‘ “ — ; etc.
  • Never use string concatenation to build SQL statements
  • Use stored procedures with parameters

Share your views with us on marketing@calsoftinc.com
Contributed by: Koushal Kawade | Calsoft Inc.

 
Share:

Related Posts

Understanding the Potential of Storage and Security in IoT

Understanding the Potential of Storage and Security in IoT

The potential of storage and security in IoT plays a significant role in transforming industries and the lives of people. However, tackling challenges such as data isolation, interoperability, and scalability will be essential in underpinning this potential. To embrace the full potential of storage and security in IoT involves a holistic method, incorporating technological advancements with comprehensive tactics. Read the blog to understand the potential of security and storage in the IoT ecosystem, its challenges, and keyways to overcome them.

Share:
Top 10 Highlights of RSA Conference 2023

Top 10 Highlights of RSA Conference 2023

The RSA Conference 2023 concluded with many insightful discussions around Cyber security. Calsoft’s representatives have compiled a list of highlights from the keynotes, panels and workshops at the conference. These highlights would help the reader understand what’s new, what needs innovation, and where the future lies, for the world of cyber security.

Share:

Enhancing Security in the Public Cloud

Public cloud has been frequently targeted for its supposedly poor security posture. Take a look at this insightful blog, which talks about how security in the public cloud is a shared responsibility of both the vendor & the organization implementing the cloud solution.

Share:

[Infoblog] Strengthen Security Operations with ServiceNow

Contact us to enhance your security & risk capabilities with ServiceNow plugins that fit your needs.

Share:

Enterprise Network Security & Key Threats in the COVID-19 Era

The COVID-19 pandemic has drastically altered the enterprise business landscape with a massive shift to remote working arrangements.

Share:

Guide to Network Security Key Considerations

We have been hearing a lot lately about the impact of COVID-19 and how it has altered the way businesses are working.

Share: