CWE-422: Unprotected Windows Messaging Channel ('Shatter')
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
The product does not properly verify the source of a message in the Windows Messaging System while running at elevated privileges, creating an alternate channel through which an attacker can directly send a message to the product.
常见后果
影响范围: Access Control
技术影响: Gain Privileges or Assume Identity Bypass Protection Mechanism
潜在缓解措施
阶段: Architecture and Design
描述: Always verify and authenticate the source of the message.
观察示例
参考: CVE-2002-0971
Bypass GUI and access restricted dialog box.
参考: CVE-2002-1230
Gain privileges via Windows message.
参考: CVE-2003-0350
A control allows a change to a pointer for a callback function using Windows message.
参考: CVE-2003-0908
Product launches Help functionality while running with raised privileges, allowing command execution using Windows message to access "open file" dialog.
参考: CVE-2004-0213
Attacker uses Shatter attack to bypass GUI-enforced protection for CVE-2003-0908.
参考: CVE-2004-0207
User can call certain API functions to modify certain properties of privileged programs.
引入模式
| 阶段 | 说明 |
|---|---|
| Architecture and Design | - |
适用平台
编程语言
分类映射
| 分类名称 | 条目ID | 条目名称 | 映射适配度 |
|---|---|---|---|
| PLOVER | - | Unprotected Windows Messaging Channel ('Shatter') | - |
| Software Fault Patterns | SFP30 | Missing endpoint authentication | - |