Bugtraq mailing list archives
Re: Bounds Checking
From: aheitner () TJHSST EDU (Ari Heitner)
Date: Tue, 21 Jul 1998 13:13:50 +0000
You know the real reason God kicked Adam & Eve Consulting Associates LLC off the Eden project, dontcha? Adam & Eve wanted to audit everything and redo Creation in java. I'm going to get shot for saying this, but this is clearly a case where the flexability of C++ to add extensions to itself (thus "a language for writing languages") would come in handy. Writing secure programs? Write yourself a secure array class. I know, the unix world depends on C, not C++. I know on many systems a good C++ compiler is not available. However, coming from a background of writing computer games, I still believe in performance. Do _anything_ in a nice tight loop 400k times and speed becomes an issue. Ada and java and what-have-you just don't cut it. Realistically tho you can implement some of the more basic parts of object-oriented design in C. It's painful to live without conveniences like templates, but most 98% of buffer overrun problems occur in arrays of chars. Using vaguely C++-like function names (i.e. array_setvalue(array myarray,long index,char value) instead of array.setvalue(...)) you could implement yourself some nice safe arrays. I think this is much better than having the bounds checker built into the compiler do something annoying and not under your control (by Murphy, the opposite of what you'd like it to do) when bounds are overrun. It's secure if the program quits when you pass it 10k 'X' characters looking for a crash, but it's _elegant_ if the program deals with the error internally rather than relying on the compiler's bounds checking code. It also gives power to the programmer, which is the point of not using visual basic :). Ari Heitner ---------- aheitner () tjhsst edu tel: 703/5733512 fax: 703/5731447
Current thread:
- SECURITY: imap-4.1.final now available, (continued)
- SECURITY: imap-4.1.final now available twiztah (Jul 16)
- Verity/Search'97 Security Problems Jay Soffian (Jul 16)
- New Java Security Flaw Found Gary McGraw (Jul 17)
- Re: New Java Security Flaw Found Greg Alexander (Jul 18)
- Re: New Java Security Flaw Found Sean Garagan (Jul 20)
- Fwd: Security warning: Netscape 4.0x https & Squid 1.2beta proxy Fred Donck (Jul 20)
- N-Base Vulnerability Advisory TTSG (Jul 20)
- IRIX 6.4 ioconfig(1M) and disk_bandwidth(1M) Vulnerability SGI Security Coordinator (Jul 20)
- IRIX 6.3 & 6.4 mailcap vulnerability SGI Security Coordinator (Jul 20)
- Bounds Checking Aleph One (Jul 20)
- Re: Bounds Checking Ari Heitner (Jul 21)
- Re: Bounds Checking Andrew McNaughton (Jul 21)
- Re: New Java Security Flaw Found Greg Alexander (Jul 18)
- Re: EMERGENCY: new remote root exploit in UW imapd Andy Church (Jul 17)
- Re: EMERGENCY: new remote root exploit in UW imapd Kragen (Jul 21)
- Re: EMERGENCY: new remote root exploit in UW imapd Craig Spannring (Jul 21)
- Re: EMERGENCY: new remote root exploit in UW imapd Kragen (Jul 21)
- Re: EMERGENCY: new remote root exploit in UW imapd matt (Jul 17)
- Re: EMERGENCY: new remote root exploit in UW imapd Niall Smart (Jul 17)
- Bounds checking - historical aside Russell Fulton (Jul 20)
- Re: Bounds checking - historical aside Brett Glass (Jul 21)
- Re: EMERGENCY: new remote root exploit in UW imapd Alex Belits (Jul 20)
- Re: EMERGENCY: new remote root exploit in UW imapd Kragen (Jul 21)
- Bounds checking - historical aside Russell Fulton (Jul 20)