Page 311 - StudyBook.pdf
P. 311

Communication Security: Web Based Services • Chapter 5  295

                 see how this situation could be dangerous.A good example of the potential effects
                 of ActiveX is the infamous Windows Exploder control.This was a neat little
                 ActiveX control written by Fred McLain (www.halcyon.com/mclain/ActiveX) that
                 demonstrates what he calls “dangerous” technology. His control only performs a
                 clean shutdown and power-off of the affected Windows system.This might not
                 seem so bad, but it was written that way to get the point across that the control
                 could be used to perform much more destructive acts. Programmers have to be
                 careful with ActiveX controls, and be sure that they know everything their control
                 is capable of before releasing it.
                    Another problem that arises as a result of lack of programmer consideration is
                 the possibility that a control will be misused and at the same time take advantage of
                 the users’ privileges. Just because the administrator has a specific use in mind for a
                 control does not mean that someone else cannot find a different use for the con-
                 trol.There are many people who are not trustworthy and will try to exploit
                 another’s creativity.
                    Another common cause of vulnerabilities in ActiveX controls is the release of
                 versions that have not been thoroughly tested and contain bugs. One specific bug
                 that is often encountered in programs is the buffer overflow bug.As we’ll discuss
                 more fully later in this chapter, buffer overflows occur when a string is copied into
                 a fixed-length array and the string is larger than the array.The result is a buffer
                 overflow and a potential application crash.With this type of error, the key is that
                 the results are unpredictable.The buffer overflow may print unwanted characters on
                 the screen, or it may kill the browser and in turn lock up the system.This problem
                 has plagued the UNIX/Linux world for years, and in recent years has become
                 more noticeable on the Windows platform. If you browse the top IT security
                 topics at Microsoft TechNet (www.microsoft.com/technet/security/current.asp),
                 you will notice numerous buffer overflow vulnerabilities. In fact, at times, one or
                 more issues involving this type of error were found monthly on the site.As men-
                 tioned, this is not exclusively a Microsoft problem, but it affects almost every
                 vendor that writes code for the Windows platform.
                    To illustrate how far-reaching this type of problem has been, in a report found
                 on the secureroot Web site (www.secureroot.com), Neal Krawetz reported that he
                 had identified a buffer overflow condition in the Shockwave Flash plug-in for Web
                 browsers. He states,“Macromedia’s Web page claims that 90 percent of all Web
                 browsers have the plug-ins installed. Because this overflow can be used to run arbi-
                 trary code, it impacts 90 percent of all Web-enabled systems.” Now that is a scary
                 thought! While this report was originally written in 2001, a similar error was
                 reported on Adobe’s Web site in 2006 regarding Shockwave Player when it is



                                                                              www.syngress.com
   306   307   308   309   310   311   312   313   314   315   316