This is a repost of a email I found on vuln-dev from last year. I thought it could season some fruitful discussions here


Maybe Steven have a newer version available? Would be nice with some illustrations to each vulnerability listed.

I for one have difficulties understanding the "off-by-one" vulnerability. Maybe a kind soul would step in?

Regards,

Mads

---

List-Id: <vuln-dev.list-id.securityfocus.com>
List-Post: <mailto:[EMAIL PROTECTED]>
List-Help: <mailto:[EMAIL PROTECTED]>
List-Unsubscribe: <mailto:[EMAIL PROTECTED]>
List-Subscribe: <mailto:[EMAIL PROTECTED]>
Delivered-To: mailing list [EMAIL PROTECTED]
Delivered-To: moderator for [EMAIL PROTECTED]
Received: (qmail 32448 invoked by uid 0); 13 Jun 2003 18:46:58 -0000
Date: Fri, 13 Jun 2003 16:47:51 -0400 (EDT)
Message-Id: <[EMAIL PROTECTED]>
From: "Steven M. Christey" <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Re: Research on Source Code Review -C
Status:


dwar keeper <[EMAIL PROTECTED]> said:



>>Am looking to develop source code review guidelines for code written >>in c/c++. I have found a few documents on the net but nothing that >>could be really followed along to do source code review. I also wanted >>to know what people in the field are actually doing and also if they >>could provide first hand experience as to what all they look for and >>how.


Following is a checklist of different vulnerability types to look for, based on some informal work I've been doing in vulnerability classification. I tried using this entire checklist one time for a small software package, and the amount of work required was staggering.

The checklist is still incomplete, but maybe some people will find it
useful.  Yes, I know this would benefit from listing specific examples
of each vuln type

>>2) Signed Overflow
>> Signed overflows occur when a signed variable is interpreted as an
>>unsigned variable.


While terminology is hardly consistent for vulnerabilities, especially new flavors like this, I believe that the evolving terminology for this type of bug is either "Signed Integer Error" or "Integer Signedness Error."

I don't know if "signed float" vulnerabilities are possible, but maybe
they wouldn't reside in the same place that integer-based issues do
(e.g. floats probably wouldn't be used *directly* for array indexing
or memory allocation).  I haven't seen any reported yet, anyway.


- Steve




================================================================
Vulnerability Auditing Checklist
================================================================
Version: 0.0000003
Modified: 2003/02/19
Created: 2002/12/04

Disclaimer: This is a DRAFT document.  The list of categories is
incomplete.  In addition, some categories overlap, and some terms are
wholly invented or ill-defined.  It has not been compared with other
sources.  This document is being publicly posted to facilitate
discussion of code review/testing procedures.


General Unexpected or Malformed Input Problems ----------------------------------------------

1. Buffer Overflows

1a. Boundary end violation ("classic overflow")

1b. Boundary beginning violation

1c. Array index modification ("index overflow" ?)

1d. Length parameter manipulation

1e. Off-by-one

1f. Other length calculation error

2. Format strings

3. Syntax/grammar violation

3a. "Empty" or blank input

3b. Missing argument

3c. Extra argument

3d. Repeated argument

3e. Missing/repeated/extra separator or delimiter

3f. Wrong data type

3g. Incomplete input

3h. Missing/misplaced special characters (delimiters/etc.)

3i. Unknown/unrecognizable argument/command/whatever

4. Special character mismanagement

4a. Shell metacharacters

4b. Delimiter between fields

4c. Delimiter between values

4d. Delimiter between records

4e. CRLF attacks (line delimiter)

4f. Section delimiter (e.g. CRLF between MIME headers and content)

4g. End-of-input delimiter (e.g. "." in mail message data)

4h. Input terminator

4i. Quoting character

4j. Escape/meta/control character

4k. General separator char

4l. Comment char

4m. Macro symbol or other char for substitution

4n. Variable name leader/terminator (e.g. "$" for env. variable)

4o. Wildcard or "completion" character


5. Dependent Field/Value Inconsistency (e.g.: a "length" field for a buffer does not reflect the actual length of the buffer; or, two fields have values that do not make sense when combined)

6. Null dereference



File/Directory Processing
-------------------------

7. Directory traversal

7a. ../filename

7b. /../filename

7c. /absolute/pathname/here

7d. /directory/../filename

7e. directory/../../filename

7f. ..\filename

7g. \..\filename

7h. \absolute\pathname\here

7i. \directory\..\filename

7j. directory\..\..\filename

7k. C:driveletter

7l. ...

7m. ....

7n. \\UNC\share\name\here

7o. //multiple/directory/separator/beginning

7p. /multiple//directory/separator/internal

7q. /multiple/directory/separator/ending//

7r. \double\\windows\\separator


8. Link Following


8a. UNIX symbolic link following

8b. UNIX hard link

8c. Windows .LNK

8d. Windows hard link

9. Windows 8.3 filenames

10. "Virtual" files

10a. Windows MS-DOS device names

10b. Windows ::DATA alternate data stream

10c. Apple ".DS_Store"


Process/Command Execution -------------------------

11. Shell metacharacters

12. Malicious search path execution (search path can be modified by
    untrusted user to point to malicious program, e.g. UNIX PATH
    environment variable)

13. Program/command argument modification


Canonicalization Errors -----------------------

14. Encodings

14a. URL encoding

14b. Unicode

15. Multiple separators or other characters (e.g. as seen in directory
    traversal)

16. Case sensitivity

17. Validate-Before-Canonicalize (a program "validates" data before it
    is canonicalized)

18. Validate-Before-Cleanse (program "validates" data before it has
    been cleansed)


Leaks -----

19. Information Leak

19a. Sensitive memory not cleared after use

19b. Sensitive memory not cleared due to compiler removal

19c. Command-line arguments visible to other processes

19d. Environment variables visible to other processes

  19e. State information leak due to inconsistent results (e.g. user
       name enumeration: valid username/wrong pass generates
       "incorrect password," but invalid username generates "incorrect
       user")

  19f. State information leak due to timing discrepancies (e.g. a
       "successful" operation takes more time than an unsuccessful
       one)

19g. Incomplete removal of temporary resources (e.g. files)

19h. Application-controlled diagnostic or error messages

  19i. Uncontrolled, external diagnostic or error messages (e.g. the
       programming language leaks information on an error that happens
       in the application)

  19j. Design-intended or configuration-intended leak (information is
       intended for publication, but sensitive)

20. Resource leaks

20a. UNIX file descriptor leak


Multiple Operation/Action Errors --------------------------------

21. Duplicate operation

21a. Double-free

21b. Double-encoding / double-decoding

22. Improper handler deployment (dispatch error)

23. Inability to handle out-of-order actions (state machine
    violations)

24. Race Condition (non-file link)

24a. Signal handler race condition

24b. Other TOCTOU

25. Deadlock


Configuration Errors --------------------

26. Permissions, ACLs, and ownership

26a. Bad default or inherited permissions (read, write, execute)

26b. Bad program-assigned permissions (read, write, execute)

26c. Ownership of critical resource not verified

27. Default configuration enables insecure feature

27a. Default password

27b. Default, non-essential service or component

27c. Network-based admin capability accessible to arbitrary hosts


Error Condition Identification/Management Errors ------------------------------------------------

28. Handler dispatch error

    28a. Improper handler deployment (the wrong "handler" is assigned
         to process an input, e.g. calling a servlet to reveal source
         code of a .JSP file, or automatically "determines" type even
         if contradictory to an explicitly specified type)

28b. Missing handler (handler not available or implemented)

    28c. Dangerous handler not cleared/disabled during sensitive
         operations

29. Insufficient logging of security-critical events

30. Incomplete error detection (product does not properly detect or
    check for security-critical error conditions)


GUI Errors ----------

31. Insufficient user warning of "unsafe" actions

32. Interface inconsistency (the user interface, API, or GUI behaves
    inconsistently with what operations are actually performed on the
    system, e.g. checking a security option does nothing, or user
    tells interface "restrict ALL" and it says "restrict SOME")


Product Management Errors -------------------------

33. Design limitations

33a. Incomplete specification

33b. Vague specification

33c. Support (or lack of support) for security-relevant options

34. Distribution Error

34a. Debugging code not omitted from production version

35. Patch Error

35a. Regression error - introduces old vulnerability

35b. Incomplete vulnerability fix

36. Documentation Error

36a. Omission of security-critical information

36b. Error/typo causes user to introduce a vulnerability or risk

37. Developer-introduced back door / Trojan Horse

38. Port Error

    A product is ported to a different environment (e.g. OS) and does
    not consider differences with the original environment - sometimes
    introducing vulnerabilities specific to the new environment

39. Interaction Error

    Two independent products work correctly and according to
    specification, but interact in ways that cause problems.



Technology-Specific Problems
----------------------------

This is probably missing a number of issues in web technologies.

40. Cross-site scripting (XSS)

41. Form field / parameter tampering

42. SQL injection

43. PHP-specific issues (PHP has "special" features without
    equivalents in other languages)

43a. PHP remote file inclusion/execution

43b. PHP untrusted external initialization of critical variables

44. Perl null character injection (technically an interaction
    vulnerability, but important to mention specifically)


Other Errors ------------

45. Initialization Error

    45a. Insecure default initialization (e.g. variables or
         permissions)

    45b. Untrusted/externally controlled initialization of trusted
         variables or values

    45c. Non-exit on failed initialization affecting security-critical
         resource (e.g. configuration file format error)

46. Resource exhaustion (memory, application-specific objects, general
    objects)

46a. Memory leak

    46b. Other incomplete resource release (resource is not "released"
         for re-use or deletion, often as a result of an unusual
         error)

    46c. Asymmetric resource consumption ("untrusted" process can make
         "trusted process" consume more resources than it really needs
         to)

47. Numeric conversion errors

47a. Integer Signedness Error

    47b. Integer overflow / underflow (value "resets" to maximum or
         minimum, often through incrementing values)

48. Authentication Error

49. Unnecesarily large privilege window (app runs at higher privileges
    longer than it "has to")

50. Capability operating at higher privilege than necessary without
    authentication

51. Infinite loop

52. Incomplete/missing security check for standardized
    algorithm/technique [e.g. the "Basic Constraints" browser cert
    issues]

53. Cryptographic error

    53a. Stores sensitive data in plaintext (passwords, credit cards,
         etc.)

53b. Does not use peer-reviewed cryptographic algorithms

53c. Does not perform all required cryptographic steps

54. Insufficient Randomness

54a. Predictable system state (time, process ID, etc.)

54b. Insufficiently large space of random values

54c. Use of "known weak" randomness algorithms

55. Miscellaneous remote code injection (inputs are fed directly into
    an interpreted language which is dynamically evaluated; other
    "classes" such as SQL injection are covered elsewhere)







Reply via email to