Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1) Each of the following code fragments contains a number of security vulnerabilities For each fragment, identify these security vulnerabilities and, for each vulnerability discuss

image text in transcribed

1) Each of the following code fragments contains a number of security vulnerabilities For each fragment, identify these security vulnerabilities and, for each vulnerability discuss at least one way that it could be improved. Note that in your discussion of how each vulnerability could be improved, you do not need to re-write a new version of the program in C; simply discuss your solution, either in pseudocode or in 1-2 sentences. (Hint: consider checking the examples in section 3.4 of the text for ideas) (60 points total 15 per code fragment) /* File Descriptor Leak/ #include #include int main(int argc, char *argv[]) char *filePath argv[e]; char *shellPathargv[1]; FILE *passwords; passwordsfopen(filePath, "r") /* Read the password and do something with it */ a) /Fork and execute alternative shell execl(shellPath, "shel11", NULL) #include Assume the following function is written for an electronic storefront. The user will enter the ID of the item to be ordered, as well as the quantity of units that they would like to purchase. The program will then lookup the price for the price for the item using a predefined function, getPriceByID), and return the total cost of the order. int getTotalCost() char itemID[9]; b) int price, unitsOrdered, cost; printf("Please enter the 9-digit ID of the item to be ordered:" scanf("%s", aitem1D); /*lookup the price according to the itemID */ price - getPriceByID (itemID); printf( "Please enter the quantity of units to be ordered: "); scanf("%d", &unitsOrdered); cost price unitsOrdered; return cost #include c) /The following function is intended to return a user's full name

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database And Expert Systems Applications 19th International Conference Dexa 2008 Turin Italy September 2008 Proceedings Lncs 5181

Authors: Sourav S. Bhowmick ,Josef Kung ,Roland Wagner

2008th Edition

3540856536, 978-3540856535

More Books

Students also viewed these Databases questions