| Bereich | Auswirkung | Wahrscheinlichkeit |
|---|---|---|
| Confidentiality | Read Memory Note: Format string problems allow for information disclosure which can severely simplify exploitation of the program. | |
| Integrity Confidentiality Availability | Modify Memory, Execute Unauthorized Code or Commands Note: Format string problems can result in the execution of arbitrary code, buffer overflows, denial of service, or incorrect data representation. |
| Referenzen | Beschreibung |
|---|---|
CVE-2002-1825 | format string in Perl program |
CVE-2001-0717 | format string in bad call to syslog function |
CVE-2002-0573 | format string in bad call to syslog function |
CVE-2002-1788 | format strings in NNTP server responses |
CVE-2006-2480 | Format string vulnerability exploited by triggering errors or warnings, as demonstrated via format string specifiers in a .bmp filename. |
CVE-2007-2027 | Chain: untrusted search path enabling resultant format string by loading malicious internationalization messages |
| CAPEC-ID | Name des Angriffsmusters |
|---|---|
| CAPEC-135 | Format String Injection
An adversary includes formatting characters in a string input field on the target application. Most applications assume that users will provide static text and may respond unpredictably to the presence of formatting character. For example, in certain functions of the C programming languages such as printf, the formatting character %s will print the contents of a memory location expecting this location to identify a string and the formatting character %n prints the number of DWORD written in the memory. An adversary can use this to read or write to memory locations or files, or simply to manipulate the value of the resulting text in unexpected ways. Reading or writing memory may result in program crashes and writing memory could result in the execution of arbitrary code if the adversary can write to the program stack. |
| CAPEC-67 | String Format Overflow in syslog()
This attack targets applications and software that uses the syslog() function insecurely. If an application does not explicitely use a format string parameter in a call to syslog(), user input can be placed in the format string parameter leading to a format string injection attack. Adversaries can then inject malicious format string commands into the function call leading to a buffer overflow. There are many reported software vulnerabilities with the root cause being a misuse of the syslog() function. |
| Name | Organisation | Datum | Veröffentlichungsdatum | Version |
|---|---|---|---|---|
| PLOVER | Draft 3 |
| Name | Organisation | Datum | Kommentar |
|---|---|---|---|
| KDM Analytics | added/updated white box definitions | ||
| CWE Content Team | MITRE | updated Applicable_Platforms, Common_Consequences, Detection_Factors, Modes_of_Introduction, Relationships, Other_Notes, Research_Gaps, Taxonomy_Mappings, Weakness_Ordinalities | |
| CWE Content Team | MITRE | updated Relationships, Taxonomy_Mappings | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Demonstrative_Examples | |
| KDM Analytics | Improved the White_Box_Definition | ||
| CWE Content Team | MITRE | updated White_Box_Definitions | |
| CWE Content Team | MITRE | updated Detection_Factors, References, Relationships, Taxonomy_Mappings | |
| CWE Content Team | MITRE | updated Common_Consequences, Relationships, Taxonomy_Mappings | |
| CWE Content Team | MITRE | updated Modes_of_Introduction, Relationships | |
| CWE Content Team | MITRE | updated Potential_Mitigations, References, Relationships, Taxonomy_Mappings | |
| CWE Content Team | MITRE | updated Observed_Examples, References, Related_Attack_Patterns, Relationships, Taxonomy_Mappings | |
| CWE Content Team | MITRE | updated Demonstrative_Examples, Detection_Factors, Relationships, Taxonomy_Mappings | |
| CWE Content Team | MITRE | updated Description, Modes_of_Introduction, Name, Relationships | |
| CWE Content Team | MITRE | updated Applicable_Platforms, Causal_Nature, Functional_Areas, Likelihood_of_Exploit, Other_Notes, References, Relationships, Taxonomy_Mappings, White_Box_Definitions | |
| CWE Content Team | MITRE | updated References | |
| CWE Content Team | MITRE | updated References, Relationships, Taxonomy_Mappings | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Detection_Factors, Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Common_Consequences, Relationships | |
| CWE Content Team | MITRE | updated Potential_Mitigations, Relationships | |
| CWE Content Team | MITRE | updated Description | |
| CWE Content Team | MITRE | updated References, Relationships | |
| CWE Content Team | MITRE | updated Mapping_Notes | |
| CWE Content Team | MITRE | updated Common_Consequences, Demonstrative_Examples, Description, Diagram, Other_Notes | |
| CWE Content Team | MITRE | updated Detection_Factors, Functional_Areas, References | |
| CWE Content Team | MITRE | updated Applicable_Platforms |