开发者

How does IPC generate security holes? [closed]

开发者 https://www.devze.com 2022-12-31 05:55 出处:网络
开发者_StackOverflowIt's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical andcannot be reasonably answered in its current
开发者_StackOverflow It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center. Closed 12 years ago.

How does interprocess communication generate security holes? Examples appreciated.


Feels like homework, but I'll bite anyways.

Any time you have one process talking to another - whether it's via pipes, sockets, shared memory, etc. those processes either need to be coded very defensively or they need to be able to "trust" each other to ensure that the inter-process communications follow the protocol that they both expect.

You always have to consider the possibility that a rouge process could be created that attempts to use whatever IPC mechanism you have in place to crash, corrupt, or gain unauthorized access to whatever data you might be sharing via IPC.

0

精彩评论

暂无评论...
验证码 换一张
取 消