Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] O_CREAT | O_EXCL flag (UNIX) O_EXCL flag (UNIX) Object Management Group (OMG) object systems, permissions objects analyzing, CC (code comprehension) C programming language change monitoring COM (Component Object Model), automation objects 2nd connection points DCOM objects activation invocation linking, vunerabilities unitialized attributes variables, management Windows NT boundary descriptor objects handles namespaces nonsecurable objects SymbolicLink objects system objects Oechslin, Philippe off-by-one errors, buffer overflows Off-by-One Length Miscalculation listing (5-2) Off-by-One Length Miscalculation listing (5-3) Off-by-One Overwrite listing (5-6) OLE (Object Linking and Embedding), COM (Component Object Model) Olsson, Mikael OMG (Object Management Group) omissions, file descriptors, UNIX ONC (Open Network Computing) RPCs 2nd open( ) function 2nd open( ) system call (UNIX) OpenBSD 2.8 2nd OpenBSD ftp Off-by-one Vulnerability listing (7-20) OpenFile( ) function opening files, stdio file system OpenMutex( ) function OpenPrivateNamespace( ) function OpenProcess( ) function OpenSSH authentication files code auditing, case study configuration file data buffers, vunerabilities external application invocation local privilege separation socket remote client socket OpenSSH Buffer Corruption Vulnerability listing (7-4) OpenSSL BUF-MEM_grow( ) function double-free vunerabiltiy OpenSSL BUF_MEM_grow( ) Signed Variable Desynchronization listing (7-5) operands, order of evaluation operating systems, file system interaction execution file uploading null bytes path traversal programmatic SSI operational vulnerabilities access control attack surfaces development protective measures ASLR (address space layout randomization) heap protection nonexecutable stacks registered function pointers stack protection VMs (virtual machines) exposure host-based measures antimnalware applications change monitoring chroot jails enhanced kernel protections file system permissions host-based firewalls host-based IDSs (intrusion detection systems) host-based IPSs (intrusion prevention systems) object system permissions restricted accounts system virtualization insecure defaults network profiles network-based measures NAT (Network Address Translation) network IDSs network IPSs segmentation VPNs (virtual private networks) secure channels spoofing unnecessary services Web-specific vulnerabilities authentication default site installations directory indexing file handlers HTTP request methods overly verbose error messages public-facing administrative interfaces Web-specific vunerabilities operational vunerabilities 2nd operations, SDLC (Systems Development Life Cycle) operators assignment operators, type conversions binary bitwise operators bitwise shift operators C programming language 2nd equality operators multiplicative operators question mark operators relational operators vulnerabilities right shift size options IP (Internet Protocol) TCP options, processing OPTIONS method order of action, ACC logs Order of Evaluation Logic Vulnerability listing (6-30) Order of Evaluation Macro Vulnerability listing (6-31) order of evaluation, operands originator validation Osborne, Anthony out-band representation, metadata out-of-order statements Out-of-Order Statements listing (7-35) Outdated Pointer Use in ProFTPD listing (7-31) Outdated Pointer Vulnerability listing (7-30) outdated pointers ProFTPD overflow multiplication overflows, Intel architectures 2nd unsigned integers Overflowing into Local Variables listing (5-4) overlapping fragments, IP (Internet Protocol) overly verbose error messages, Web-based applications overwriting bytes ownership, UNIX files, race conditions |