diff --git a/weaknesses/MASVS-CODE/MASWE-0116.md b/weaknesses/MASVS-CODE/MASWE-0116.md index 9ef191053f..c90b1d31a5 100644 --- a/weaknesses/MASVS-CODE/MASWE-0116.md +++ b/weaknesses/MASVS-CODE/MASWE-0116.md @@ -11,6 +11,8 @@ refs: - https://www.mcafee.com/enterprise/en-us/assets/white-papers/wp-secure-coding-android-applications.pdf - https://mas.owasp.org/MASTG/0x05i-Testing-Code-Quality-and-Build-Settings/#binary-protection-mechanisms - https://mas.owasp.org/MASTG/0x06i-Testing-Code-Quality-and-Build-Settings/#binary-protection-mechanisms +- https://sensepost.com/blog/2021/on-ios-binary-protections/ +- https://www.sans.org/blog/stack-canaries-gingerly-sidestepping-the-cage/ draft: description: e.g., PIC, stack canaries. Alternative title could be Memory Anti-Exploitation Mechanisms Not Implemented topics: @@ -18,6 +20,7 @@ draft: - stack canaries note: PIC cannot be switched off in newer versions of Android, the NDK does not link against such libraries anymore [source](https://cs.android.com/android/platform/superproject/main/+/main:bionic/linker/linker_main.cpp;l=397?q=linker_main&ss=android%2Fplatform%2Fsuperproject%2Fmain). status: draft - +observed_examples: +- https://nvd.nist.gov/vuln/detail/CVE-2019-3568 ---