Difference between revisions of "Error Conditions, Return Values, Status Codes"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
{{Template:Stub}}
+
{{template:CandidateForDeletion}}
{{Template:Vulnerability}}
+
  
 
__TOC__
 
__TOC__
Line 8: Line 7:
 
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
 
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
  
 
[[Category:FIXME|This is the text from the old template. This needs to be rewritten using the new template.]]
 
[[Category:FIXME|Stub article, needs review]]
 
  
 
==Description==
 
==Description==
Line 44: Line 40:
 
TBD
 
TBD
  
[[Category:FIXME|add links
 
 
In addition, one should classify vulnerability based on the following subcategories: Ex:<nowiki>[[Category:Error Handling Vulnerability]]</nowiki>
 
 
Availability Vulnerability
 
 
Authorization Vulnerability
 
 
Authentication Vulnerability
 
 
Concurrency Vulnerability
 
 
Configuration Vulnerability
 
 
Cryptographic Vulnerability
 
 
Encoding Vulnerability
 
 
Error Handling Vulnerability
 
 
Input Validation Vulnerability
 
 
Logging and Auditing Vulnerability
 
 
Session Management Vulnerability]]
 
  
 
__NOTOC__
 
__NOTOC__
 
 
[[Category:OWASP ASDR Project]]
 
[[Category:Error Handling Problem]]
 
[[Category:Vulnerability]]
 

Revision as of 10:26, 31 January 2009


This page was marked to be reviewed for deletion.


Contents


ASDR Table of Contents

Last revision (mm/dd/yy): 01/31/2009


Description

Invalid or unhandled error conditions, return values and status codes result in unexpected application behaviors.

Attackers try to crash the application or launch a denail of service attack by triggering the unhandled conditions.


Risk Factors

TBD

Examples

TBD

Related Attacks

Related Vulnerabilities

Related Controls

Related Technical Impacts

References

TBD