This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Portability Flaw"

From OWASP
Jump to: navigation, search
 
(Description)
 
(4 intermediate revisions by the same user not shown)
Line 2: Line 2:
 
{{Template:Fortify}}
 
{{Template:Fortify}}
  
==Abstract==
+
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
  
Functions with inconsistent implementations across operating systems and operating system versions cause portability problems.
+
[[ASDR_TOC_Vulnerabilities|Vulnerabilities Table of Contents]]
  
 
==Description==
 
==Description==
 +
Functions with inconsistent implementations across operating systems and operating system versions cause portability problems.
  
 
The behavior of functions in this category varies by operating system, and at times, even by operating system version. Implementation differences can include:
 
The behavior of functions in this category varies by operating system, and at times, even by operating system version. Implementation differences can include:
  
* Slight differences in the way parameters are interpreted leading to inconsistent results.  
+
* Slight differences in the way parameters are interpreted, leading to inconsistent results.  
 
* Some implementations of the function carry significant security risks.  
 
* Some implementations of the function carry significant security risks.  
* The function might not be defined on all platforms.  
+
* The function might not be defined on all platforms.
 +
 
 +
==Risk Factors==
 +
TBD
 +
 
 +
==Examples==
 +
TBD
 +
 
 +
==Related [[Attacks]]==
 +
 
 +
* [[Attack 1]]
 +
* [[Attack 2]]
 +
 
 +
 
 +
==Related [[Vulnerabilities]]==
 +
 
 +
* [[Vulnerability 1]]
 +
* [[Vulnerabiltiy 2]]
 +
 
 +
==Related [[Controls]]==
 +
 
 +
* [[Control 1]]
 +
* [[Control 2]]
 +
 
 +
 
 +
==Related [[Technical Impacts]]==
 +
 
 +
* [[Technical Impact 1]]
 +
* [[Technical Impact 2]]
 +
 
 +
 
 +
==References==
  
==Examples ==
+
TBD
 +
[[Category:FIXME|add links
  
==Related Threats==
+
In addition, one should classify vulnerability based on the following subcategories: Ex:<nowiki>[[Category:Error Handling Vulnerability]]</nowiki>
  
==Related Attacks==
+
Availability Vulnerability
  
==Related Vulnerabilities==
+
Authorization Vulnerability
  
==Related Countermeasures==
+
Authentication Vulnerability
  
==Categories==
+
Concurrency Vulnerability
  
 +
Configuration Vulnerability
 +
 +
Cryptographic Vulnerability
 +
 +
Encoding Vulnerability
 +
 +
Error Handling Vulnerability
 +
 +
Input Validation Vulnerability
 +
 +
Logging and Auditing Vulnerability
 +
 +
Session Management Vulnerability]]
 +
 +
__NOTOC__
 +
 +
 +
[[Category:OWASP ASDR Project]]
 
[[Category:Code Quality Vulnerability]]
 
[[Category:Code Quality Vulnerability]]
 
 
[[Category:Implementation]]
 
[[Category:Implementation]]
 +
[[Category:Vulnerability]]

Latest revision as of 13:34, 27 February 2009

This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.

This article includes content generously donated to OWASP by MicroFocus Logo.png

Last revision (mm/dd/yy): 02/27/2009

Vulnerabilities Table of Contents

Description

Functions with inconsistent implementations across operating systems and operating system versions cause portability problems.

The behavior of functions in this category varies by operating system, and at times, even by operating system version. Implementation differences can include:

  • Slight differences in the way parameters are interpreted, leading to inconsistent results.
  • Some implementations of the function carry significant security risks.
  • The function might not be defined on all platforms.

Risk Factors

TBD

Examples

TBD

Related Attacks


Related Vulnerabilities

Related Controls


Related Technical Impacts


References

TBD