![]() | This article has multiple issues. Please helpimprove it or discuss these issues on thetalk page.(Learn how and when to remove these messages) (Learn how and when to remove this message)
|
Secure coding is the practice of developing computersoftware in such a way that guards against the accidental introduction ofsecurity vulnerabilities. Defects,bugs and logic flaws are consistently the primary cause of commonly exploited software vulnerabilities.[1] Through the analysis of thousands of reported vulnerabilities, security professionals have discovered that most vulnerabilities stem from a relatively small number of common software programming errors. By identifying the insecure coding practices that lead to these errors and educating developers on secure alternatives, organizations can take proactive steps to help significantly reduce or eliminate vulnerabilities in software before deployment.[2]
Some scholars have suggested that in order to effectively confront threats related tocybersecurity, proper security should be coded or “baked in” to the systems. With security being designed into the software, this ensures that there will be protection against insider attacks and reduces the threat to application security.[3]
Buffer overflows, a common software security vulnerability, happen when a process tries to store data beyond a fixed-length buffer. For example, if there are 8 slots to store items in, there will be a problem if there is an attempt to store 9 items. In computer memory the overflowed data may overwrite data in the next location which can result in a security vulnerability (stack smashing) or program termination (segmentation fault).[1]
An example of aC program prone to a buffer overflow is
intvulnerable_function(char*large_user_input){chardst[SMALL];strcpy(dst,large_user_input);}
If the user input is larger than the destination buffer, a buffer overflow will occur.To fix this unsafe program, use strncpy to prevent a possible buffer overflow.
intsecure_function(char*user_input){chardst[BUF_SIZE];// copy a maximum of BUF_SIZE bytesstrncpy(dst,user_input,BUF_SIZE);// set the last character in the buffer to NUL.dst[BUF_SIZE-1]='\0';}
Another secure alternative is to dynamically allocate memory on the heap usingmalloc.
char*secure_copy(char*src){size_tlen=strlen(src);char*dst=(char*)malloc(len+1);if(dst!=NULL){strncpy(dst,src,len);// append null terminatordst[len]='\0';}returndst;}
In the above code snippet, the program attempts to copy the contents ofsrc intodst, while also checking the return value of malloc to ensure that enough memory was able to be allocated for the destination buffer.
AFormat String Attack is when a malicious user supplies specific inputs that will eventually be entered as an argument to a function that performs formatting, such asprintf(). The attack involves the adversary reading from or writing to thestack.
The C printf function writes output to stdout. If the parameter of the printf function is not properly formatted, several security bugs can be introduced. Below is a program that is vulnerable to a format string attack.
intvulnerable_print(char*malicious_input){printf(malicious_input);}
A malicious argument passed to the program could be "%s%s%s%s%s%s%s", which can crash the program from improper memory reads.
Integer overflow occurs when an arithmetic operation results in an integer too large to be represented within the available space. A program which does not properly check for integer overflow introduces potential software bugs and exploits.
Below is a function inC++ which attempts to confirm that the sum of x and y is less than or equal to a defined value MAX:
boolsumIsValid_flawed(unsignedintx,unsignedinty){unsignedintsum=x+y;returnsum<=MAX;}
The problem with the code is it does not check for integer overflow on the addition operation. If the sum of x and y is greater than the maximum possible value of anunsigned int
, the addition operation will overflow and perhaps result in a value less than or equal to MAX, even though the sum of x and y is greater than MAX.
Below is a function which checks for overflow by confirming the sum is greater than or equal to both x and y. If the sum did overflow, the sum would be less than x or less than y.
boolsumIsValid_secure(unsignedintx,unsignedinty){unsignedintsum=x+y;returnsum>=x&&sum>=y&&sum<=MAX;}
Path traversal is a vulnerability whereby paths provided from an untrusted source are interpreted in such a way that unauthorised file access is possible.
For example, consider a script that fetches an article by taking a filename, which is then read by the script andparsed. Such a script might use the following hypothetical URL to retrieve an article aboutdog food:
https://www.example.net/cgi-bin/article.sh?name=dogfood.html
If the script has no input checking, instead trusting that the filename is always valid, amalicious user could forge a URL to retrieve configuration files from the web server:
https://www.example.net/cgi-bin/article.sh?name=../../../../../etc/passwd
Depending on the script, this may expose the/etc/passwd file, which onUnix-like systems contains (among others)user IDs, theirlogin names,home directory paths andshells. (SeeSQL injection for a similar attack.)