paint-brush
How To Win The Race Against TOCTOU Vulnerabilities in C & C++by@sonarsource
499 reads
499 reads

How To Win The Race Against TOCTOU Vulnerabilities in C & C++

by SonarSource2mOctober 11th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

SonarSource announces a new rule to detect a literal race condition: TOCTOU (or TOCTTOU) vulnerabilities, known in long-form as Time Of Check (to) Time Of Use. The idea is that there's a window of opportunity between when a privileged program checks a file (Does the file exist? Are permissions okay for what we're about to do? …) and when it operates on that file. In that window, an attacker could replace the file with e.g. a symlink to `/etc/passwd` and the operation you meant to perform on `/home/ann/tmp` happens to an important system file instead.

Company Mentioned

Mention Thumbnail
featured image - How To Win The Race Against TOCTOU Vulnerabilities in C & C++
SonarSource HackerNoon profile picture
SonarSource

SonarSource

@sonarsource

We build world-class Code Quality & Security tools: SonarQube, SonarLint and SonarCloud

L O A D I N G
. . . comments & more!

About Author

SonarSource HackerNoon profile picture
SonarSource@sonarsource
We build world-class Code Quality & Security tools: SonarQube, SonarLint and SonarCloud

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here