CWE-228: Improper Handling of Syntactically Invalid Structure

Class Incomplete Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product does not handle or incorrectly handles input that is not syntactically well-formed with respect to the associated specification.

常见后果

影响范围: Integrity Availability

技术影响: Unexpected State DoS: Crash, Exit, or Restart DoS: Resource Consumption (CPU)

说明: If an input is syntactically invalid, then processing the input could place the system in an unexpected state that could lead to a crash, consume available system resources or other unintended behaviors.

检测方法

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

观察示例

参考: CVE-2004-0270

Anti-virus product has assert error when line length is non-numeric.

引入模式

阶段 说明
Implementation -

分类映射

分类名称 条目ID 条目名称 映射适配度
PLOVER - Structure and Validity Problems -
OWASP Top Ten 2004 A7 Improper Error Handling CWE More Specific
关键信息

CWE ID: CWE-228

抽象级别: Class

结构: Simple

状态: Incomplete

相关弱点