Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 5 December, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

GHOST coding mistake: 5 reasons to take notice

by The Gurus
January 28, 2015
in This Week's Gurus
Share on FacebookShare on Twitter

When I hear about another software bug, I’m tempted to shrug.  Big deal.  Another bug in software.  It happens.
But there are some things about this coding mistake which are interesting:
 

  1. This is a security bug, which can be exploited locally and remotely.  That’s interesting because modern OS protections like ASLR, NX, and safe malloc were supposed to limit the exploitation of this type of bug (a small heap buffer overflow).  (And those protections did succeed in making the finders work harder to write a working exploit.)

 

  1. The bug is in a core library which is broadly used.  Which means countless machines could be affected.

 

  1. The bug is in open source code.  For a time there was a group of folks that believed open source software was fundamentally more secure, when compared to closed source code.  After a number of big name bugs in open source like Heartbleed,  Shellshock, and now Ghost – I’d say we can finally put that theory to rest.

 

  1. The finders took the time to give the bug a name, a logo, and plenty of press.  I’m not sure if this is good or bad.  Good, because the fix will hit quicker due to awareness.  Bad, because the potential exists that now only properly hyped bugs will receive due notice.  (This same effect can happen, btw, even inside closed software development programs, where only the bugs with proper manager awareness get attention.)

 

  1. The bug is in a low level code (C language).  There will continue to be a need for high-performance components to be written in low level code, but everything else should be written in a memory safe(r) language where possible.  This should be commonly understood, but I’m not sure that it is.

 
At the end of the day, we see that software quality has improved.  And so have built in OS protections.  But the complexity of software, the dependence on library code, and the cost of a major security breach have all increased at an even greater rate.  Therefore we can expect a continued dependence on novel security products and services to help protect our computers.
 
 
Jared DeMott is a security researcher at Bromium Labs

FacebookTweetLinkedIn
ShareTweet
Previous Post

Give01Day partners with Cyber Streetwise to offer Cyber Essentials certification to UK charities

Next Post

Data Privacy Day musings from the Infosec community

Recent News

New Synopsys Report Reveals Application Security Automation Soars

December 5, 2023
Over 80% of IT Leaders Want to Move Their On-Prem PAM Solution to the Cloud

Over 80% of IT Leaders Want to Move Their On-Prem PAM Solution to the Cloud

December 5, 2023
Centripetal real logo

Centripetal Announces Partnership With Tiger to Provide Cybersecurity Innovation to the UK Market

December 5, 2023
Google bins inactive accounts

Google bins inactive accounts

December 1, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information