Home Home Tech Are you a dangerous programmer?
×

Warning

JUser: :_load: Unable to load user with ID: 3286
Dangerous is probably not a description you would apply to the average programmer, let alone yourself. However, the Microsoft, Symantec and even the US Department of Homeland Security are worried that you could unwittingly be just that and intend to prove it.

The people who set up cloned websites for online scams are undoubtedly annoying and criminal, but you could hardly call them dangerous.

Likewise, spam botnet coders are evil scumbags, but not exactly up there with Osama Bin Laden on the danger front.

However, according to MITRE and the SANS Institute, there are some 25 programming errors which can lead to serious software vulnerabilities. These are frequent in occurrence and are both easy to find and exploit.

It is these programming errors which make you a dangerous coder. Dangerous because they can allow attackers to completely control software, to steal data or just prevent the software from working in some way.

The 2009 CWE/SANS Top 25 Most Dangerous Programming Errors list comes after collaboration between both MITRE and SANS along with numerous software experts from the likes of Microsoft and Symantec in Europe and the US.

SANS has contributed via the Top 20 Attack Vectors development process, while MITRE kicks in with it's Common Weakness Enumeration project and the US Department of Homeland Security's National Cyber Security Division helps out with web hosting.

The aim of the list is to help you become a better coder by understanding your weaknesses, educating programmers how to spot and remove common mistakes before software is released.

So just what are the Top 25 Most Dangerous Programming Errors according to the CWE/SANS list? More on page 2.

CONTINUES


For the full breakdown and detailed descriptions you need to head over to the CWE/SANS site itself, which is broken down into three main categories: Insecure Interaction Between Components, Risky Resource Management and Porous Defenses.

Within these categories you will find multiple entries that combine to make up that top 25 list. Here is just a very brief overview.

The Insecure Interaction Between Components section covers weaknesses related to the way data is sent and received, including:

Improper Input Validation, Improper Encoding or Escaping of Output, Failure to Preserve SQL Query Structure, Failure to Preserve Web Page Structure, Failure to Preserve OS Command Structure, Cleartext Transmission of Sensitive Information, Cross-Site Request Forgery, Race Condition and Error Message Information Leaks.

Risky Resource Management, meanwhile, covers errors relating to software not managing system resource creation, usage, transfer or destruction properly, including:

Failure to Constrain Operations within the Bounds of a Memory Buffer, External Control of Critical State Data, External Control of File Name or Path, Untrusted Search Path, Failure to Control Generation of Code, Download of Code Without Integrity Check, Improper Resource Shutdown or Release, Improper Initialization and Incorrect Calculation.

Finally, Porous Defenses deals with the misuse and abuse of defensive techniques such as:

Improper Access Control, Use of a Broken or Risky Cryptographic Algorithm, Hard-Coded Password, Insecure Permission Assignment for Critical Resource, Use of Insufficiently Random Values, Execution with Unnecessary Privileges, Client-Side Enforcement of Server-Side Security.

FREE SEMINAR

Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect