1.6 The impact associated with types of vulnerabilities Flashcards

1
Q

Race conditions

A

Occur when the outcome from execution processes is directly dependent on the order and timing of certain events/multiple threads, and those events fail to execute in the order or timing intended by the developer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

End-of-life systems

A

System that is no longer supported by its developer or vendor, no longer recieve security updates and so represent a critical vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Embedded systems

A

A complete computer system that is designed to perform a specific dedicated function. ex. a microcontroller in a medical drip or components in a control sys managing a water treatment plant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lack of vendor support

A

No security life-cycle management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Misconfiguration/weak configuration

A

Ex. a system that may leave admin access protected with a default account or password that is publicly available.
Ex. Leaving sensitive ports open to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Resource exhaustion

A

Overloading a service by using CPU, system RAM, disk space, or network bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Improperly configured accounts

A

When an account is either to restricted resulting in tons of support calls. Or the account is granted too many privileges, weakening the security of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Weak cipher suites and implementations

A

A cipher that cannot use long keys. Vulnerable to brute force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Memory/buffer vulnerability

A

Allows an attacker to run arbitrary code on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Memory leak

A

When a program doesn’t release unused memory. Could lead to a system crash due to lack of memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integer overflow

A

An attack that causes the target software to calculate a value that exceeds the bounds of the integer data type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Buffer overflow

A

An attacker passes data that deliberately overfills the buffer (an area of memory) that the application reserves to store the expected data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pointer dereference

A

Accessing a pointer/memory address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DLL injection

A

A software vulnerability that occurs when a Windows-based application attempts to force another running application to load a Dynamic Link Library (DLL) in memory that could cause the victim application to experience instability or leak sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

System sprawl/undocumented assets

A

These undocumented systems represent an exploitable vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Architecture/design weakness

A

Examples:

1) “pinch points” relying on a single hardware server or network channel.
2) Complex dependencies: services that require many different systems to be available.
3) Availability of confidentiality and integrity.
4) Lack of documentation and change control.
5) Overdependence on perimeter security: network architecture is “flat” (meaning any host can contact any other host) gives the attacker freedom of movement.

17
Q

Improper certificate and key management

A

1) if the attacker obtains the private key, confidentiality is compromised.
2) if the attacker gains the ability to create ‘valid’ signed certificates, then the attacker will be trusted.
3) if the key for encryption is destroyed any data encrypted using that key will be inaccessible.

18
Q

Improper input validation

A

An attack that passes invalid data to the application, and because the input handling is inadequate, it causes the app or OS to behave in unexpected ways. Two general vulnerabilities are the following:

Overflow—the attacker submits input that is larger than the variables assigned by the application to store it can cope with.

Injection—the attacker embeds code within the input or appends code to it that executes when the server processes the submission.