Vulnerabilities
Security vulnerabilities may be placed into two groups: design vulnerabilities and implementation vulnerabilities.
Design Vulnerabilities
Design vulnerabilities exist due to poor design or a design that does not take into account the security requirements for a particular protocol, network, system, or application. (Compare these to implementation vulnerabilities, which are discussed next.)
Implementation Vulnerabilities
Implementation vulnerabilities are a result of bad or inadequate implementation of a system designed with security in mind (compare these to design vulnerabilities). Most often, the targets are widely-used software, such as BIND, sendmail, and FTP servers.
Common Gateway Interface (CGI) Vulnerabilities
These ...
Get Solaris 8 Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.