Re: Robustness of CoreData against malicious documents?
Re: Robustness of CoreData against malicious documents?
- Subject: Re: Robustness of CoreData against malicious documents?
- From: Cem Karan <email@hidden>
- Date: Tue, 4 Apr 2006 10:53:40 -0400
If the user has access to the machine, there will be far easier
ways to run code at an elevated level (after all, OS X is not a
trusted platform and is only rated as being "suitable for a
cooperative non-hostile environment" <http://niap.nist.gov/cc-
scheme/st/ST_VID4012.html>).
This isn't a problem, but it is a good point.
If you are worried about untrusted data sources, one could always
run an XML verifier before loading the data (where at least you
could get a level assurance based on the XML verifier, or for the
truly paranoid, run the XML verifier as a part of an assured
pipeline on a trusted machine (i.e, "Rainbow book" level of
assurance)).
I was hoping that CoreData would handle this for me... :/
After all, nobody can realistically say "product XYZ is immune to
buffer overflow". If you absolutely cannot accept any possibility
of an exploit allowing untrusted code to run at an elevated level,
you'll need to switch to a different operating system (or convince
Apple to add type enforcement to their kernel)
You're right, I really wanted to see how 'strong' CoreData really is;
I'll have to write some tests and see how hard it is to break.
Thanks,
Cem Karan
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Cocoa-dev mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden