comp.lang.ada
 help / color / mirror / Atom feed
From: Robert Dewar <robert_dewar@my-deja.com>
Subject: Re: FY Ammo: Study about Security Bugs
Date: 1999/11/25
Date: 1999-11-25T00:00:00+00:00	[thread overview]
Message-ID: <81k5oi$44k$1@nnrp1.deja.com> (raw)
In-Reply-To: m366yqk69o.fsf@kiuk0156.chembio.ntnu.no

In article <m366yqk69o.fsf@kiuk0156.chembio.ntnu.no>,
  Preben Randhol <randhol@pvv.org> wrote:
> I know C and C++ programs can be, if not coded
> properly, but I would think Ada 95 programs wasn't (unless one
> are
> perhaps interfacing towards C?). If somebody could shed some
> light on
> this, it would be great.


That's right, Ada 95 programs are FAR less susecptible to the
buffer overflow problem (not impregnable, bad coding can achieve
any desired goal, and for example, an Ada program interfacing
directly to memcpy is at risk).

There are two reasons for this

1. If checks are on, out of range subscripts will be caught
by exceptions.

2. Even if checks are off, the kind of low level programming
approaches used in C (memcpy for example) are typically not used
in Ada, so it is far less likely that Ada code would be
susceptible to such attacks.


Sent via Deja.com http://www.deja.com/
Before you buy.




  reply	other threads:[~1999-11-25  0:00 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
1999-11-25  0:00 FY Ammo: Study about Security Bugs Lutz Donnerhacke
1999-11-25  0:00 ` Preben Randhol
1999-11-25  0:00   ` Robert Dewar [this message]
1999-11-26  0:00     ` Preben Randhol
1999-11-26  0:00       ` Gisle S�lensminde
1999-11-26  0:00         ` Preben Randhol
1999-11-26  0:00         ` Robert Dewar
1999-11-26  0:00       ` Robert Dewar
1999-11-26  0:00         ` Keith Thompson
1999-11-26  0:00     ` Lutz Donnerhacke
1999-11-26  0:00       ` Robert Dewar
replies disabled

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox