Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Risk Assessment

Violations of this rule could have to be detected automatically but may require substantial redevelopment effort if functions must be revised to accept different parameter types. Noncompliance may lead to concurrency violations that put data integrity at risk and may also result in abnormal program terminationmanually detected because it is a consequence of the overall design of the password storing mechanism. It is pretty unlikely, since it will occur around once or twice in a program that uses passwords. As demonstrated above, almost all violations of this rule have a clear exploit associated with them.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

CON40 MSC18-C J

medium

unlikely likely

medium high

P4 P6

L3 L2