CAPEC-476: Signature Spoofing by Misrepresentation

Detailed Draft 严重程度: High 攻击可能性: Low

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An attacker exploits a weakness in the parsing or display code of the recipient software to generate a data blob containing a supposedly valid signature, but the signer's identity is falsely represented, which can lead to the attacker manipulating the recipient software or its victim user to perform compromising actions.

前提条件

  • Recipient is using signature verification software that does not clearly indicate potential homographs in the signer identity.Recipient is using signature verification software that contains a parsing vulnerability, or allows control characters in the signer identity field, such that a signature is mistakenly displayed as valid and from a known or authoritative signer.

所需技能

High Attacker needs to understand the layout and composition of data blobs used by the target application.
High To discover a specific vulnerability, attacker needs to reverse engineer signature parsing, signature verification and signer representation code.
High Attacker may be required to create malformed data blobs and know how to insert them in a location that the recipient will visit.

缓解措施

Ensure the application is using parsing and data display techniques that will accurately display control characters, international symbols and markings, and ultimately recognize potential homograph attacks.

关键信息

CAPEC ID: CAPEC-476

抽象级别: Detailed

状态: Draft

典型严重程度: High

攻击可能性: Low

相关攻击模式
相关CWE弱点