CAPEC-540: Overread Buffers

Standard Draft 严重程度: High 攻击可能性: Low

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.

执行流程

步骤 1 Explore

[Identify target application] The adversary identifies a target application or program to perform the buffer overread on. Adversaries often look for applications that accept user input and that perform manual memory management.

步骤 2 Experiment

[Find attack vector] The adversary identifies an attack vector by looking for areas in the application where they can specify to read more data than is required.

步骤 3 Exploit

[Overread the buffer] The adversary provides input to the application that gets it to read past the bounds of a buffer, possibly revealing sensitive information that was not intended to be given to the adversary.

前提条件

  • For this type of attack to be successful, a few prerequisites must be met. First, the targeted software must be written in a language that enables fine grained buffer control. (e.g., c, c++) Second, the targeted software must actually perform buffer operations and inadequately perform bounds-checking on those buffer operations. Finally, the adversary must have the capability to influence the input that guides these buffer operations.

后果影响

影响范围: Confidentiality

技术影响: Read Data

说明: By reading outside the boundary of the intended buffer, the adversary is potentially able to see any data that is stored on the disk. This could include secret keys, personal information, and sensitive files.

影响范围: Availability

技术影响: Unreliable Execution

说明: Depending on the use of the target buffer, an application or system crash can be achieved.

关键信息

CAPEC ID: CAPEC-540

抽象级别: Standard

状态: Draft

典型严重程度: High

攻击可能性: Low

相关攻击模式
相关CWE弱点