From the course: CISSP Cert Prep (2021): 8 Software Development Security
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Race condition vulnerabilities
From the course: CISSP Cert Prep (2021): 8 Software Development Security
Race condition vulnerabilities
- [Instructor] Race conditions are a particularly dangerous security flaw that require careful attention from software developers. A race condition occurs when the proper functioning of a security control depends upon the timing of activities performed by the computer or the user. If the timing doesn't occur as expected the software may behave in an unexpected manner causing a significant security vulnerability. A common example of a race condition is the time of check to time of use or talk to vulnerability. In a talk to vulnerability, software checks to see whether an activity is authorized and then some time elapses before it performs the action that it checked. Let's take a look at an example of a bank account. Imagine an ATM machine that dispenses cash. The algorithm for this machine might work like this. The user inserts an ATM card, enters a pin. The machine verifies the pin and checks the available account balance.…
Contents
-
-
-
-
-
OWASP Top 105m 36s
-
Application security4m 13s
-
Preventing SQL injection4m 25s
-
Understanding cross-site scripting3m 17s
-
Request forgery4m 8s
-
Defending against directory traversal3m 6s
-
Overflow attacks3m 21s
-
Explaining cookies and attachments4m 25s
-
Session hijacking4m 8s
-
Code execution attacks2m 43s
-
Privilege escalation1m 56s
-
Driver manipulation2m 16s
-
Memory vulnerabilities3m 34s
-
Race condition vulnerabilities2m 13s
-
-
-
-