How will source code review catch buffer overrun?

 If my test will not catch it then there is this probability it will not occur.

On Tue, Oct 13, 2009 at 1:17 PM, Gideon N. Guillen
<[email protected]> wrote:
>> I'm talking in the context of checking the Automated Election System, as to,
>
> Alright, let's use the buffer overrun vulnerabilities in the context of AES, 
> because it happened before in an AES system used by a state in US. The AES 
> machine proposed in our country is using an optical scanner to count votes 
> from a ballot. Over the years, several buffer overrun vulnerabilities have 
> been discovered on image processing libraries. An existing AES from another 
> country shipped with image processing libraries with these kind of 
> vulnerabilities. And someone found out a way to create an input (on paper to 
> be scanned) tat will exploit this buffer overrun vulnerabilities to execute 
> any kind of instruction. Those instructions can be "dada-g-bawas" routine.
>
> There's no way in the world you can catch that using "outcome based" only 
> tests.
> _________________________________________________
> Philippine Linux Users' Group (PLUG) Mailing List
> http://lists.linux.org.ph/mailman/listinfo/plug
> Searchable Archives: http://archives.free.net.ph
>
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to