SV-222612r561272_rule
V-222612
SRG-APP-000450
APSC-DV-002590
CAT I
10
Design the application to use a language or compiler that performs automatic bounds checking.
Use an abstraction library to abstract away risky APIs.
Use compiler-based canary mechanisms such as StackGuard, ProPolice, and the Microsoft Visual Studio/GS flag.
Use OS-level preventative functionality and control user input validation.
Patch applications when overflows are identified in vendor products.
Review the application documentation and architecture.
Interview the application admin and identify the most recent code testing and analysis that has been conducted.
Review the test results; verify configuration of analysis tools are set to check for the existence of overflows. This includes but is not limited to buffer overflows, stack overflows, heap overflows, integer overflows and format string overflows.
If overflows are identified in the test results, verify the latest test results are being used, if not, ensure remediation has been completed.
If the test results show overflows exist and no remediation evidence is presented, or if test results are not available, this is a finding.
V-222612
False
APSC-DV-002590
Review the application documentation and architecture.
Interview the application admin and identify the most recent code testing and analysis that has been conducted.
Review the test results; verify configuration of analysis tools are set to check for the existence of overflows. This includes but is not limited to buffer overflows, stack overflows, heap overflows, integer overflows and format string overflows.
If overflows are identified in the test results, verify the latest test results are being used, if not, ensure remediation has been completed.
If the test results show overflows exist and no remediation evidence is presented, or if test results are not available, this is a finding.
M
4093