How does interprocess communication generate security holes? Examples appreciated.
How does interprocess communication generate security holes? Examples appreciated.
Share
Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Feels like homework, but I’ll bite anyways.
Any time you have one process talking to another – whether it’s via pipes, sockets, shared memory, etc. those processes either need to be coded very defensively or they need to be able to “trust” each other to ensure that the inter-process communications follow the protocol that they both expect.
You always have to consider the possibility that a rouge process could be created that attempts to use whatever IPC mechanism you have in place to crash, corrupt, or gain unauthorized access to whatever data you might be sharing via IPC.