At 2:16 PM +0100 11/2/07, Johan Peeters wrote:

> I have been looking at an IBM system. If I do something like this
> 
>           ...
>            01 txt                             PIC  X(120)
>            ....
>            string '**'
>              into txt
>            end-string
>            display txt
> 
> I get to see ** on sysout followed by what appears to be selected
> contents of the data section. This strikes me as somewhat worrysome -
> it reminds me of the format string vulnerabilities in C.
> Am I just being paranoid?

A program that improperly releases data due to programmer error is
beyond what I consider to be the realm of security.  To me that is
merely bad programming.

To me the criterion is whether an outsider can cause a program to do
something other than what it does for normal users.  Some secret back
door password that causes organizational secrets to be released would
be a Trojan horse.  A typical method of controlling that is with the
security controls on a database, so only authorized users can read the
"company secret" field, no matter how badly the application programmer
messes up.
-- 
Larry Kilgallen
_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
_______________________________________________

Reply via email to