CWE-67: Improper Handling of Windows Device Names

Variant Incomplete Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product constructs pathnames from user input, but it does not handle or incorrectly handles a pathname containing a Windows device name such as AUX or CON. This typically leads to denial of service or an information exposure when the application attempts to process the pathname as a regular file.

扩展描述

Not properly handling virtual filenames (e.g. AUX, CON, PRN, COM1, LPT1) can result in different types of vulnerabilities. In some cases an attacker can request a device via injection of a virtual filename in a URL, which may cause an error that leads to a denial of service or an error page that reveals sensitive information. A product that allows device names to bypass filtering runs the risk of an attacker injecting malicious code in a file with the name of a device.

常见后果

影响范围: Availability Confidentiality Other

技术影响: DoS: Crash, Exit, or Restart Read Application Data Other

潜在缓解措施

阶段: Implementation

描述: Be familiar with the device names in the operating system where your system is deployed. Check input for these device names.

观察示例

参考: CVE-2002-0106

Server allows remote attackers to cause a denial of service via a series of requests to .JSP files that contain an MS-DOS device name.

参考: CVE-2002-0200

Server allows remote attackers to cause a denial of service via an HTTP request for an MS-DOS device name.

参考: CVE-2002-1052

Product allows remote attackers to use MS-DOS device names in HTTP requests to cause a denial of service or obtain the physical path of the server.

参考: CVE-2001-0493

Server allows remote attackers to cause a denial of service via a URL that contains an MS-DOS device name.

参考: CVE-2001-0558

Server allows a remote attacker to create a denial of service via a URL request which includes a MS-DOS device name.

参考: CVE-2000-0168

Microsoft Windows 9x operating systems allow an attacker to cause a denial of service via a pathname that includes file device names, aka the "DOS Device in Path Name" vulnerability.

参考: CVE-2001-0492

Server allows remote attackers to determine the physical path of the server via a URL containing MS-DOS device names.

参考: CVE-2004-0552

Product does not properly handle files whose names contain reserved MS-DOS device names, which can allow malicious code to bypass detection when it is installed, copied, or executed.

参考: CVE-2005-2195

Server allows remote attackers to cause a denial of service (application crash) via a URL with a filename containing a .cgi extension and an MS-DOS device name.

引入模式

阶段 说明
Implementation -
Operation -

适用平台

编程语言
Not Language-Specific (Undetermined)
操作系统
Windows (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
PLOVER - Windows MS-DOS device names -
CERT C Secure Coding FIO32-C Do not perform operations on devices that are only appropriate for files CWE More Specific
The CERT Oracle Secure Coding Standard for Java (2011) FIO00-J Do not operate on files in shared directories -
Software Fault Patterns SFP16 Path Traversal -
关键信息

CWE ID: CWE-67

抽象级别: Variant

结构: Simple

状态: Incomplete

利用可能性: High

相关弱点