February 16, 2010
A group of over 30 national and international computer security groups on Tuesday released a list of the 25 most dangerous programming errors as part of an effort to make the custom software business more accountable.
For the U.S., where recent cyber attacks against Google and dozens of other companies have underscored the porousness of computer networks, this is a welcome development.
"We believe that integrity of hardware and software products is a critical element of cybersecurity," The Office of the Director of National Intelligence said in a statement. "Creating more secure software is a fundamental aspect of system and network security, given that the federal government and the nation's critical infrastructure depend on commercial products for business operations. The Top 25 programming errors initiative is an important component of an overall security initiative for our country. We applaud this effort and encourage the utility of this tool through other venues such as cyber education."
Earlier this month, Dennis C. Blair, Director of National Intelligence, told the Senate Intelligence Committee that U.S. critical infrastructure is "severely threatened" by cyber attacks.
Because many cyber threats rely on software vulnerabilities, there's a broad effort to improve computer science education so that programmers become better at writing secure code.
On a phone briefing for reporters, Alan Paller, director of research at the SANS Institute, said that one of the goals of the Top 25 list is to help companies avoid being in the situation faced by Siemens recently.
According to Paller, Siemens in 2008 paid over 100,000 Euros for a software package and found that security wasn't part of the deal. After weeks of negotiations, the company had to pay about 145,000 Euros more to make its custom software secure.
By providing detailed information about common software programming problems, SANS, MITRE and the other security organizations that compiled the list hope that software buyers and software vendors will be able to create contracts that require custom code to be free of the Top 25 errors. The goal is to force vendors to test the security of their software and to provide customers with their test results.
"No one likes to share test results that show them writing bad code," said Paller.
Toward that end, the procurement language used by the State of New York and other state governments is being changed to ensure that these Top 25 errors are avoided. Other states are likely to follow.
Awareness of the Top 25 errors is also likely to be reflected in university computer science courses and in employers' evaluations of programmers.
The Top 25 list includes:
1) CWE-79 - Failure to Preserve Web Page Structure ('Cross-site Scripting')
2) CWE-89 - Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection')
3) CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
4) CWE-352 - Cross-Site Request Forgery (CSRF)
5) CWE-285 - Improper Access Control (Authorization)
6) CWE-807 - Reliance on Untrusted Inputs in a Security Decision
7) CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
8) CWE-434 - Unrestricted Upload of File with Dangerous Type
9) CWE-78 - Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection')
10) CWE-311 - Missing Encryption of Sensitive Data
For further information, see MITRE.org's Web site.
About the Author(s)
You May Also Like
Cloud Crisis Management: Tech Insights Report
Solution Brief: Fortinet FortiFlex Delivers Usage-Based Security Licensing That Moves at the Speed of Digital Acceleration
The New Frontier of Cyber Security: Securing the Network Edge
Ultimate Guide to the CISSP
Top Six Recommendations to Improve User Productivity with a Hybrid Architecture