Michael Howard again

So I am back with Micahel Howard’s problems. This article (though old) has a very simple code snippet for a user to find out why it is insecure. With due respect to the man, I think this code snippet is much too obvious for a user to ignore. Even the compiler does flag a warning (even in the least of the warning levels). But then, since he provided the code, lets see what the problem is.
Continue reading “Michael Howard again”

And indeed Only the paranoid survive

Andy Grove might not be a professional business book writer, but then he managed to be crisp.Only the paranoid survive is not a voluminous book, like the usual business books are. The book mainly deals with change management – not in exact words of course. The author calls it a 10X change. He goes on to mention the transitions that occur when there is a 10X situation – the attitudes of middle management, the intertia towards change, how should a manager try to deal with this kind of a change. He agrees that the middle/senior management has a pre-set notions which are difficult to change and this can hamper the transition when there is an inflection point impending.
Continue reading “And indeed Only the paranoid survive

Did you know what the MZ is in the exe is?

Some people do things that will immortalize them. And one of the very less known fact (to the not so computer wise) is that the first two bytes in a any Windows executable is MZ. These two letters are the intials of one of the architects of MS-DoS – Mark Zbikowski. Just out of curiosity, wanted to know how this Harvard returned looked. And google indeed helped me out. There was just one image I could get of this man and according to me he doesnot look like a nerd ;). Mark Zbikowski is one of the men (and or women) who created the executable file format for the first operating system from Microsoft for the PC – the MS-DoS.

Michael Howard and the printf buffer overflow

Michael Howard is a well known author of security articles. His articles appear on MSDN. In the article dated September 19th 2003, he talks about Integer overflow ReduxInteger overflow Redux. Nice article, but this post is not on the article itself, but the small spot the security flaw at the end of the article.
It looks like a very harmless piece of code. And I was not able to find the solution. I was able to understand the problem after he posted the solution in the recent article Analyzing Your Applications with Windows Application Verifier. Aaah, missed the ‘.’ in the format string.
Continue reading “Michael Howard and the printf buffer overflow”

Is this a bug ?

In the XPCom project, there are lots of string classes catering to a bunch of needs. One of them is the nsDependentSingleFragmentSubString, which is used to create a dependent string from an existing string (so that the memory cleanup is not the class’s headache).
In one of the constructors, there seems to be a rather a quirky problem. I am not sure if this indeed is a problem, will need to check up once more before I send it to the drivers on bugzilla.
Continue reading “Is this a bug ?”