Host change using externally controlled elements
Changing host ID from an unsecure source
Description
This defect occurs when routines that change the host ID, such as sethostid
(Linux®) or SetComputerName
(Windows®), use arguments that are externally controlled.
Risk
The tainted host ID value can allow external control of system settings. This control can disrupt services, cause unexpected application behavior, or cause other malicious intrusions.
Fix
Use caution when changing or editing the host ID. Do not allow user-provided values to control sensitive data.
Extend Checker
By default, Polyspace® assumes that data from external sources are tainted. See Sources of Tainting in a Polyspace Analysis. To consider
any data that does not originate in the current scope of Polyspace analysis as
tainted, use the command line option -consider-analysis-perimeter-as-trust-boundary
.
Examples
Result Information
Group: Tainted Data |
Language: C | C++ |
Default: Off |
Command-Line Syntax: TAINTED_HOSTID |
Impact: Medium |
Version History
Introduced in R2015b
See Also
Execution of externally controlled command
| Use of externally controlled environment variable
| Command executed from externally controlled path
| Library loaded from externally controlled path
| Find defects (-checkers)
| -consider-analysis-perimeter-as-trust-boundary
Topics
- Interpret Bug Finder Results in Polyspace Desktop User Interface
- Interpret Bug Finder Results in Polyspace Access Web Interface (Polyspace Access)
- Address Results in Polyspace User Interface Through Bug Fixes or Justifications
- Address Results in Polyspace Access Through Bug Fixes or Justifications (Polyspace Access)
- Sources of Tainting in a Polyspace Analysis
- Modify Default Behavior of Bug Finder Checkers