SHARE
Facebook X Pinterest WhatsApp

LinuxFocus.org: Avoiding security holes when developing an application – Part 1

Written By
FR
Frédéric Raynal
Feb 18, 2001

“It doesn’t take more than two weeks before a major application,
part of most Linux distributions, presents a security hole,
allowing, for instance, a local user to become root. Despite the
great quality of most of this software, ensuring the security of a
program is a hard job : it must not allow a bad guy to benefit
illegally from system resources. The availability of application
source code is a good thing, much appreciated by programmers, but
the smallest defect in a software becomes visible to everyone.
Furthermore, the detection of such defects comes at random and
people doing that sort of things do not always act with good
intentions.”

“From the sysadmin side, daily work consists of reading the
lists concerning security problems and updating immediately the
involved packages. For a programmer it can be a good lesson to try
out such security problems. Avoiding security holes from the
beginning is preferred. We’ll try to define some “classic”
dangerous behaviors and provide solutions to reduce the risks. We
won’t talk about network security problems since they often come
from configuration mistakes (dangerous cgi-bin scripts, …) or
from system bugs allowing DOS (Denial Of Service) type attacks to
prevent a machine from listening to its own clients. These problems
concern the sysadmin or the kernel developers, but the application
programmer too, as soon as he takes into account external data. For
instance, pine, acroread, netscape, access,… on some versions
under some conditions allowed remote access or information leaks.
As a matter of fact secure programming is everyone’s concern.”

“This set of articles shows methods which can be used to damage
an Unix system. We could only have mentioned them or said a few
words about them, but we prefer open explanations to make people
understand the risks. Thus, when debugging a program or developing
your own, you’ll be able to avoid or correct these mistakes. For
each discussed hole, we will take the same approach. We’ll start
detailing the way it works. Next, we will show how to avoid it. For
every example we will use security holes still presents in wide
spread software.”


Complete Story

FR

Frédéric Raynal

Recommended for you...

A Thorough Approach to Improve the Privacy and Security of Your Linux PC
Damien
Oct 24, 2024
Several Russian Maintainers Removed From Linux Kernel Due To Compliance Concerns
Senthil Kumar
Oct 23, 2024
OpenSSH Splits Again: New Authentication Binary Unveiled
Bobby Borisov
Oct 16, 2024
13 Best Free and Open Source Anti-Malware Tools
webmaster
Oct 14, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.