Research Article

A Quantitative Assessment Approach to COTS Component Security

Table 3

Testing results for six tested components.

IDFault injection factorThe number of vulnerabilities and its Test resultSecurity level

01IIV2
(0.13, 0.13)
ThunderAgent_005.dll has two methods calling (GetInfoStruct(), GetTaskInfoStruc()) neglected the input parameter exception and generated security vulnerability. Then they resulted in program breakdown0.7569

02CIV, LSV, RSV5
(0.1, 0.2, 0.1, 0.15, 0.2)
AcroPDF.dll did not correctly deal with the string parameters sent to function setPageMode(), LoadFile(), setLayoutMode() and setNamedDest() and the attribute src. It triggered memory destroyed and resulted in security vulnerability for executing any instruction.0.4406

03LSV, RSV, FSV1
(0.64)
The function SetInfo() of GLItemCom.DLL ActiveX over trusted user input and did not check parameter’s length. It resulted in the point the virtual function covered.0.36

04LSV, RSV, FSV1
(0.1)
Pdg2.dll did not deal with the sent parameter to Register (), if user sends the string over 256 bytes, it can trigger stack overflow and execute any code.0.9

05LSV, RSV, USV1
(0.15)
GomManager object did not collectively deal with the first parameter of OpenURL() in IGomManager interface. If transmitting the long parameters over 500 bytes, it can trigger stack overflow to result in visiting the memory exception.0.85

06PSN, CIV, PIV, LSV, USV5
(0.15, 0.15, 0.15, 0.15, 0.15)
5 methods of component existed security exception. The test case parameters implemented by input fault injection operator would result in buffer overflow, visiting beyond the scope, and memory leakage.0.4437