CAPEC-123: Buffer Manipulation

Meta Draft 严重程度: Very High 攻击可能性: High

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary manipulates an application's interaction with a buffer in an attempt to read or modify data they shouldn't have access to. Buffer attacks are distinguished in that it is the buffer space itself that is the target of the attack rather than any code responsible for interpreting the content of the buffer. In virtually all buffer attacks the content that is placed in the buffer is immaterial. Instead, most buffer attacks involve retrieving or providing more input than can be stored in the allocated buffer, resulting in the reading or overwriting of other unintended program memory.

前提条件

  • The adversary must identify a programmatic means for interacting with a buffer, such as vulnerable C code, and be able to provide input to this interaction.

后果影响

影响范围: Availability

技术影响: Unreliable Execution

说明: A buffer manipulation attack often results in a crash of the application due to the corruption of memory.

影响范围: Confidentiality

技术影响: Execute Unauthorized Commands

说明: If constructed properly, a buffer manipulation attack can be used to contol the execution of the application leading to any number of negative consequenses.

缓解措施

To help protect an application from buffer manipulation attacks, a number of potential mitigations can be leveraged. Before starting the development of the application, consider using a code language (e.g., Java) or compiler that limits the ability of developers to act beyond the bounds of a buffer. If the chosen language is susceptible to buffer related issues (e.g., C) then consider using secure functions instead of those vulnerable to buffer manipulations. If a potentially dangerous function must be used, make sure that proper boundary checking is performed. Additionally, there are often a number of compiler-based mechanisms (e.g., StackGuard, ProPolice and the Microsoft Visual Studio /GS flag) that can help identify and protect against potential buffer issues. Finally, there may be operating system level preventative functionality that can be applied.

关键信息

CAPEC ID: CAPEC-123

抽象级别: Meta

状态: Draft

典型严重程度: Very High

攻击可能性: High

相关CWE弱点