CAPEC-679: Exploitation of Improperly Configured or Implemented Memory Protections
CAPEC版本: 3.9
更新日期: 2023-01-24
攻击模式描述
前提条件
- Access to the hardware being leveraged.
所需技能
后果影响
影响范围: Integrity
技术影响: Modify Data
影响范围: Confidentiality
技术影响: Read Data
影响范围: Confidentiality Integrity Availability
技术影响: Execute Unauthorized Commands
说明: Run Arbitrary Code
影响范围: Confidentiality Access Control Authorization
技术影响: Gain Privileges
缓解措施
Ensure that protected and unprotected memory ranges are isolated and do not overlap.
If memory regions must overlap, leverage memory priority schemes if memory regions can overlap.
Ensure that original and mirrored memory regions apply the same protections.
Ensure immutable code or data is programmed into ROM or write-once memory.