Design Vulnerabilities

There are two types of vulnerabilities, and one of them is design vulnerability. Design vulnerability exists when a particular system, software, or protocol is designed without keeping in mind security considerations and without embedding security into the design specification. Examples of design vulnerabilities are the telnet, File Transfer Protocol (FTP), and Remote Login (RLOGIN) protocols. They do not address such issues as connection eavesdropping, connection hijacking, Domain Name System (DNS) spoofing, and impersonation, among others. (It’s not that these were real problems at the time these protocols were designed. But never mind. There are no excuses in security.)

Get Solaris 8 Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.