O



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

O_CREAT | O_EXCL flag (UNIX)
O_EXCL flag (UNIX)
Object Management Group (OMG)
object systems, permissions
objects
     analyzing, CC (code comprehension)
     C programming language
     change monitoring
     COM (Component Object Model), automation objects 2nd
     connection points
    DCOM objects
         activation
         invocation
     linking, vunerabilities
     unitialized attributes
     variables, management
     Windows NT
         boundary descriptor objects
         handles
         namespaces
         nonsecurable objects
         SymbolicLink objects
         system objects
Oechslin, Philippe
off-by-one errors, buffer overflows
Off-by-One Length Miscalculation listing (5-2)
Off-by-One Length Miscalculation listing (5-3)
Off-by-One Overwrite listing (5-6)
OLE (Object Linking and Embedding), COM (Component Object Model)
Olsson, Mikael
OMG (Object Management Group)
omissions, file descriptors, UNIX
ONC (Open Network Computing) RPCs 2nd
open( ) function 2nd
open( ) system call (UNIX)
OpenBSD 2.8 2nd
OpenBSD ftp Off-by-one Vulnerability listing (7-20)
OpenFile( ) function
opening files, stdio file system
OpenMutex( ) function
OpenPrivateNamespace( ) function
OpenProcess( ) function
OpenSSH
     authentication files
     code auditing, case study
     configuration file
     data buffers, vunerabilities
     external application invocation
     local privilege separation socket
     remote client socket
OpenSSH Buffer Corruption Vulnerability listing (7-4)
OpenSSL
     BUF-MEM_grow( ) function
     double-free vunerabiltiy
OpenSSL BUF_MEM_grow( ) Signed Variable Desynchronization listing (7-5)
operands, order of evaluation
operating systems, file system interaction
     execution
     file uploading
     null bytes
     path traversal
     programmatic SSI
operational vulnerabilities
     access control
     attack surfaces
     development protective measures
         ASLR (address space layout randomization)
         heap protection
         nonexecutable stacks
         registered function pointers
         stack protection
         VMs (virtual machines)
     exposure
     host-based measures
         antimnalware applications
         change monitoring
         chroot jails
         enhanced kernel protections
         file system permissions
         host-based firewalls
         host-based IDSs (intrusion detection systems)
         host-based IPSs (intrusion prevention systems)
         object system permissions
         restricted accounts
         system virtualization
     insecure defaults
     network profiles
     network-based measures
         NAT (Network Address Translation)
         network IDSs
         network IPSs
         segmentation
         VPNs (virtual private networks)
     secure channels
     spoofing
     unnecessary services
    Web-specific vulnerabilities
         authentication
         default site installations
         directory indexing
         file handlers
         HTTP request methods
         overly verbose error messages
         public-facing administrative interfaces
     Web-specific vunerabilities
operational vunerabilities 2nd
operations, SDLC (Systems Development Life Cycle)
operators
     assignment operators, type conversions
     binary bitwise operators
     bitwise shift operators
     C programming language 2nd
     equality operators
     multiplicative operators
     question mark operators
     relational operators
    vulnerabilities
         right shift
         size
options
     IP (Internet Protocol)
     TCP options, processing
OPTIONS method
order of action, ACC logs
Order of Evaluation Logic Vulnerability listing (6-30)
Order of Evaluation Macro Vulnerability listing (6-31)
order of evaluation, operands
originator validation
Osborne, Anthony
out-band representation, metadata
out-of-order statements
Out-of-Order Statements listing (7-35)
Outdated Pointer Use in ProFTPD listing (7-31)
Outdated Pointer Vulnerability listing (7-30)
outdated pointers
     ProFTPD
overflow
     multiplication overflows, Intel architectures 2nd
     unsigned integers
Overflowing into Local Variables listing (5-4)
overlapping fragments, IP (Internet Protocol)
overly verbose error messages, Web-based applications
overwriting bytes
ownership, UNIX files, race conditions




The Art of Software Security Assessment. Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net