So, what to look for?
Inputs validation
I suppose it is trivial, but are the inputs validated correctly?Time of check, time of use
Well, the inputs were validated, but are they under external control?If they are, the attacker will be able to change them after they were validated, and cause havoc.
It is not really relevant in case of web requests, but when two entities communicate using shared memory it can happen.
Accessing single resource
When you have multiple threads and single resource, do note how the access is controlled.Give special care for the initiation of the locking mechanism.
In general multi threading programming is hard, and the lower-level of the programming, the harder it gets.
No comments:
Post a Comment