[Identify target application] The adversary identifies a target application or program to perform the buffer overread on. Adversaries often look for applications that accept user input and that perform manual memory management.
[Find attack vector] The adversary identifies an attack vector by looking for areas in the application where they can specify to read more data than is required.
[Overread the buffer] The adversary provides input to the application that gets it to read past the bounds of a buffer, possibly revealing sensitive information that was not intended to be given to the adversary.
| Weakness Name | |
|---|---|
CWE-125 |
Out-of-bounds Read The product reads data past the end, or before the beginning, of the intended buffer. |
| Name | Organization | Date | Date release |
|---|---|---|---|
| CAPEC Content Team | The MITRE Corporation |
| Name | Organization | Date | Comment |
|---|---|---|---|
| CAPEC Content Team | The MITRE Corporation | Updated Execution_Flow |