Vulnerabilities

Security vulnerabilities may be placed into two groups: design vulnerabilities and implementation vulnerabilities.

Design Vulnerabilities

Design vulnerabilities exist due to poor design or a design that does not take into account the security requirements for a particular protocol, network, system, or application. (Compare these to implementation vulnerabilities, which are discussed next.)

Implementation Vulnerabilities

Implementation vulnerabilities are a result of bad or inadequate implementation of a system designed with security in mind (compare these to design vulnerabilities). Most often, the targets are widely-used software, such as BIND, sendmail, and FTP servers.

Common Gateway Interface (CGI) Vulnerabilities

These ...

Get Solaris 8 Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.