• Guest
HabraHabr
  • Main
  • Users

  • Development
    • Programming
    • Information Security
    • Website development
    • JavaScript
    • Game development
    • Open source
    • Developed for Android
    • Machine learning
    • Abnormal programming
    • Java
    • Python
    • Development of mobile applications
    • Analysis and design of systems
    • .NET
    • Mathematics
    • Algorithms
    • C#
    • System Programming
    • C++
    • C
    • Go
    • PHP
    • Reverse engineering
    • Assembler
    • Development under Linux
    • Big Data
    • Rust
    • Cryptography
    • Entertaining problems
    • Testing of IT systems
    • Testing Web Services
    • HTML
    • Programming microcontrollers
    • API
    • High performance
    • Developed for iOS
    • CSS
    • Industrial Programming
    • Development under Windows
    • Image processing
    • Compilers
    • FPGA
    • Professional literature
    • OpenStreetMap
    • Google Chrome
    • Data Mining
    • PostgreSQL
    • Development of robotics
    • Visualization of data
    • Angular
    • ReactJS
    • Search technologies
    • Debugging
    • Test mobile applications
    • Browsers
    • Designing and refactoring
    • IT Standards
    • Solidity
    • Node.JS
    • Git
    • LaTeX
    • SQL
    • Haskell
    • Unreal Engine
    • Unity3D
    • Development for the Internet of things
    • Functional Programming
    • Amazon Web Services
    • Google Cloud Platform
    • Development under AR and VR
    • Assembly systems
    • Version control systems
    • Kotlin
    • R
    • CAD/CAM
    • Customer Optimization
    • Development of communication systems
    • Microsoft Azure
    • Perfect code
    • Atlassian
    • Visual Studio
    • NoSQL
    • Yii
    • Mono и Moonlight
    • Parallel Programming
    • Asterisk
    • Yandex API
    • WordPress
    • Sports programming
    • Lua
    • Microsoft SQL Server
    • Payment systems
    • TypeScript
    • Scala
    • Google API
    • Development of data transmission systems
    • XML
    • Regular expressions
    • Development under Tizen
    • Swift
    • MySQL
    • Geoinformation services
    • Global Positioning Systems
    • Qt
    • Dart
    • Django
    • Development for Office 365
    • Erlang/OTP
    • GPGPU
    • Eclipse
    • Maps API
    • Testing games
    • Browser Extensions
    • 1C-Bitrix
    • Development under e-commerce
    • Xamarin
    • Xcode
    • Development under Windows Phone
    • Semantics
    • CMS
    • VueJS
    • GitHub
    • Open data
    • Sphinx
    • Ruby on Rails
    • Ruby
    • Symfony
    • Drupal
    • Messaging Systems
    • CTF
    • SaaS / S+S
    • SharePoint
    • jQuery
    • Puppet
    • Firefox
    • Elm
    • MODX
    • Billing systems
    • Graphical shells
    • Kodobred
    • MongoDB
    • SCADA
    • Hadoop
    • Gradle
    • Clojure
    • F#
    • CoffeeScript
    • Matlab
    • Phalcon
    • Development under Sailfish OS
    • Magento
    • Elixir/Phoenix
    • Microsoft Edge
    • Layout of letters
    • Development for OS X
    • Forth
    • Smalltalk
    • Julia
    • Laravel
    • WebGL
    • Meteor.JS
    • Firebird/Interbase
    • SQLite
    • D
    • Mesh-networks
    • I2P
    • Derby.js
    • Emacs
    • Development under Bada
    • Mercurial
    • UML Design
    • Objective C
    • Fortran
    • Cocoa
    • Cobol
    • Apache Flex
    • Action Script
    • Joomla
    • IIS
    • Twitter API
    • Vkontakte API
    • Facebook API
    • Microsoft Access
    • PDF
    • Prolog
    • GTK+
    • LabVIEW
    • Brainfuck
    • Cubrid
    • Canvas
    • Doctrine ORM
    • Google App Engine
    • Twisted
    • XSLT
    • TDD
    • Small Basic
    • Kohana
    • Development for Java ME
    • LiveStreet
    • MooTools
    • Adobe Flash
    • GreaseMonkey
    • INFOLUST
    • Groovy & Grails
    • Lisp
    • Delphi
    • Zend Framework
    • ExtJS / Sencha Library
    • Internet Explorer
    • CodeIgniter
    • Silverlight
    • Google Web Toolkit
    • CakePHP
    • Safari
    • Opera
    • Microformats
    • Ajax
    • VIM
  • Administration
    • System administration
    • IT Infrastructure
    • *nix
    • Network technologies
    • DevOps
    • Server Administration
    • Cloud computing
    • Configuring Linux
    • Wireless technologies
    • Virtualization
    • Hosting
    • Data storage
    • Decentralized networks
    • Database Administration
    • Data Warehousing
    • Communication standards
    • PowerShell
    • Backup
    • Cisco
    • Nginx
    • Antivirus protection
    • DNS
    • Server Optimization
    • Data recovery
    • Apache
    • Spam and antispam
    • Data Compression
    • SAN
    • IPv6
    • Fidonet
    • IPTV
    • Shells
    • Administering domain names
  • Design
    • Interfaces
    • Web design
    • Working with sound
    • Usability
    • Graphic design
    • Design Games
    • Mobile App Design
    • Working with 3D-graphics
    • Typography
    • Working with video
    • Work with vector graphics
    • Accessibility
    • Prototyping
    • CGI (graphics)
    • Computer Animation
    • Working with icons
  • Control
    • Careers in the IT industry
    • Project management
    • Development Management
    • Personnel Management
    • Product Management
    • Start-up development
    • Managing the community
    • Service Desk
    • GTD
    • IT Terminology
    • Agile
    • Business Models
    • Legislation and IT-business
    • Sales management
    • CRM-systems
    • Product localization
    • ECM / EDS
    • Freelance
    • Venture investments
    • ERP-systems
    • Help Desk Software
    • Media management
    • Patenting
    • E-commerce management
    • Creative Commons
  • Marketing
    • Conferences
    • Promotion of games
    • Internet Marketing
    • Search Engine Optimization
    • Web Analytics
    • Monetize Web services
    • Content marketing
    • Monetization of IT systems
    • Monetize mobile apps
    • Mobile App Analytics
    • Growth Hacking
    • Branding
    • Monetize Games
    • Display ads
    • Contextual advertising
    • Increase Conversion Rate
  • Sundry
    • Reading room
    • Educational process in IT
    • Research and forecasts in IT
    • Finance in IT
    • Hakatonas
    • IT emigration
    • Education abroad
    • Lumber room
    • I'm on my way

The Internet can have serious problems due to languages ​​like C and C ++ that contribute to the appearance of vulnerabilities.

 3r3147. 3r3-31. Hi, Habr! I present to you the translation of the article " Internet aurait de sérieux problèmes à cause de langages comme et c ++ favorisant la survenue de failles " 3r3133.  3r3147. 3r3133.  3r3147.

But there are very few developers who care about

3r3133.  3r3147. One bug affects the iPhone, the other - Windows, and the third - servers running Linux. At first glance, these bugs have nothing in common, as they concern different platforms: Android, iOS, macOS, Windows, Linux. However, in reality, everything is different, according to Alex Gaynor, a software security engineer at Mozilla, who previously worked at USDS (United States Digital Service). 3r3133.  3r3147. 3r3133.  3r3147.
[1] [/b] 3r3355. Read more - 3r320. https://www.usds.gov
, hereinafter approx. translator. 3r3133.  3r3147. 3r3143. 3r3143. 3r3133.  3r3147. During the third “Weakest Link”, the annual event organized by Motherboard Vice,
 3r3147. 3r3133.  3r3147.
[2] [/b] 3r3355. Read more - https://motherboard.vice.com/en_us 3r3133.  3r3147. 3r3143. 3r3143. 3r3133.  3r3147. on computer hacking and cyber security in the future, Alex Gaynor raised a serious problem that, in his opinion, could threaten the Internet, but, paradoxically, leaves developers completely indifferent. 3r3133.  3r3147. 3r3133.  3r3147. Gaynor explained that the three previously mentioned bugs exist because the software they affect on different platforms was written using programming languages ​​that have an unpleasant tendency to contribute to “memory unsafety” errors, allowing access to unallocated areas of memory. 3r3133.  3r3147. 3r3133.  3r3147.
[3] [/b] 3r3355. Most likely, it was meant that accessing the 6th element of an array consisting of 5 elements is permissible, although in other programming languages ​​that are more “safe”, at least an error message will be displayed. 3r3133.  3r3147. 3r3143. 3r3143. 3r3133.  3r3147. This category of errors can lead to bugs and security vulnerabilities while accessing memory. 3r3133.  3r3147.
3r3365. 3r3133.  3r3147. By allowing for memory unsafety errors, programming languages ​​such as C and C ++ can contribute to the spread of an almost infinite stream of critical security vulnerabilities over the years. An example of these vulnerabilities is 3r3134.  3r3147. 3r3133.  3r3147.
 3r3147.
inconsistency types
 3r3147.
buffer overflow
 3r3147.
overflow of integer variables
 3r3147.
use after free vulnerability
 3r3147. 3r3386. 3r3133.  3r3147. A type mismatch can occur when a code segment does not check the type of the object passed to it and uses it blindly. This situation can be dangerous. In addition, along with the type mismatch, incorrect function pointers or incorrect data are associated with the wrong part of the code, which in some cases can lead to its execution. 3r3133.  3r3147. 3r3133.  3r3147. Buffer overflow (or "English" buffer overflow ") is a critical security vulnerability that occurs when a user enters a string that will be in an array of undersized characters. This results in writing data outside the memory area allocated for the array. HeartBleed, for example, which had an impact on 17% of secure servers on the Internet, was a buffer overflow vulnerability that could read 60KB after the end of the list, including passwords and other user data. 3r3133.  3r3147. 3r3133.  3r3147. Overflowing of integer variables is a hard-to-find vulnerability that exploits the fact that numbers cannot exceed a certain value, which depends on the number of bits used to represent them, and the encoding method. 3r3133.  3r3147. 3r3133.  3r3147. The use after free vulnerability usually occurs when using a pointer or in-memory data when the pointer (or block of memory) is already released. 3r3133.  3r3147. 3r3133.  3r3147. Together, these vulnerabilities are exploits that are most commonly found in popular software, such as Firefox, Chrome, Windows, Android, or iOS. Gaynor has already counted at least 400 and claims: “I have followed the security of these projects for more than a year, and in almost all versions of these products more than half of the vulnerabilities are“ memory unsafety ”. And even more alarming is the fact that the heavy and critical vulnerabilities[]almost always have this type. ” 3r3133.  3r3147. 3r3133.  3r3147. Despite the significant risks associated with the security of software that they support, programming languages ​​“memory unsafety friendly”, such as C or C ++, are still used by developers, while proven alternatives, such as Rust, Swift, that can be considered as languages ​​“memory safe”, rare. 3r3133.  3r3147. 3r3133.  3r3147. This may be due to the fact that for a new project, developers tend to choose a programming language based on languages ​​that their team knows, performance, and library systems that can flow from this choice. When making decisions, the security component associated with this is almost never considered, or at least is considered insufficiently, Gaynor believes. 3r3133.  3r3147. 3r3133.  3r3147. In addition, most software projects, even the most important ones for Internet security, are not new. They were launched ten years ago, if not more. Linux, OpenSSL and the Apache web server, for example, for more than twenty years. For large-scale projects like these, rewriting all the code in a new language is not an option. They must be transformed gradually, which means that projects must be written and saved in two different languages ​​instead of one. It also implies the need to form a large team, which takes a lot of time and requires more funds. 3r3133.  3r3147. 3r3133.  3r3147. The biggest problem, finally, is related to the fact that many developers do not believe at all that a problem exists. They believe that the problem is not that languages ​​such as C or C ++ contribute to the emergence of vulnerabilities, but in other programmers who write code with errors. They believe that there are no problems with these supposedly “memory unsafety friendly” languages, because no code is perfect, people just do not know how to use them. 3r3133.  3r3147. 3r3133.  3r3147. And what do you think about this? 3r3133.  3r3147. 3r3133.  3r3147.
3r3133.  3r3147. I note that the sound criticism of the translation is also welcome. 3r3133.  3r3147. 3r3133.  3r3147. Thanks for attention! 3r3143. 3r3147. 3r3147. 3r3147. 3r33140. ! function (e) {function t (t, n) {if (! (n in e)) {for (var r, a = e.document, i = a.scripts, o = i.length; o-- ;) if (-1! == i[o].src.indexOf (t)) {r = i[o]; break} if (! r) {r = a.createElement ("script"), r.type = "text /jаvascript", r.async =! ? r.defer =! ? r.src = t, r.charset = "UTF-8"; var d = function () {var e = a.getElementsByTagName ("script")[0]; e. ): d ()}}} t ("//mediator.mail.ru/script/2820404/"""_mediator") () (); 3r3141. 3r3147. 3r3143. 3r3147. 3r3147. 3r3147. 3r3147.

It may be interesting

  • Comments
  • About article
  • Similar news
This publication has no comments.

weber

Author

8-12-2018, 22:16

Publication Date

Development / Programming

Category
  • Comments: 0
  • Views: 285
How to cut off the light in a small
Programmable wireless dimmer Noolite
Memoization of the default kwarg in
MC.exe (Message compiler), rc.exe,
BDSM, Gore and the harassment of the
Resiliency of the application when
Write a comment
Name:*
E-Mail:


Comments
Nice post! This is a very nice blog that I will definitively come back to more times this year! Thanks for informative post.Torrance Tax Accountant

Today, 15:51

raymond weber

Someone Sometimes with visits your blog regularly and recommended it in my experience to read as well. The way of writing is excellent and also the content is top-notch. Thanks for that insight you provide the readers! 123movies websites 
Today, 15:21

Legend SEO

Extremely intriguing online journal. A lot of web journals I see nowadays don't generally give anything that I'm keen on, however I'm most definitely inspired by this one. Recently felt that I would post and let you know.먹튀

Today, 15:14

raymond weber

Man's lives, such as uncontrolled huge amounts, definitely not while countries furthermore reefs, challenging to seismic disturbance upward perfect apply. เมล็ด กาแฟ คั่ว
Today, 14:54

nushra45

 The top five occupations were all medical and surgical jobs where workers ... as of May 2019, the most recent period for which data is available.


https://iptvbeast.net/
Today, 14:53

Jhon Smith

Adv
Website for web developers. New scripts, best ideas, programming tips. How to write a script for you here, we have a lot of information about various programming languages. You are a webmaster or a beginner programmer, it does not matter, useful articles will help to make your favorite business faster.

Login

Registration Forgot password