O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Vulnerabilities

Security vulnerabilities may be placed into two groups: design vulnerabilities and implementation vulnerabilities.

Design Vulnerabilities

Design vulnerabilities exist due to poor design or a design that does not take into account the security requirements for a particular protocol, network, system, or application. (Compare these to implementation vulnerabilities, which are discussed next.)

Implementation Vulnerabilities

Implementation vulnerabilities are a result of bad or inadequate implementation of a system designed with security in mind (compare these to design vulnerabilities). Most often, the targets are widely-used software, such as BIND, sendmail, and FTP servers.

Common Gateway Interface (CGI) Vulnerabilities

These ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required