CAPEC-477

Signature Spoofing by Mixing Signed and Unsigned Content
Bajo
Alto
Draft
2014-06-23
00h00 +00:00
Alerta para un CAPEC
Manténgase informado sobre cualquier cambio en un CAPEC específico.
Gestionar notificaciones

Descripciones CAPEC

An attacker exploits the underlying complexity of a data structure that allows for both signed and unsigned content, to cause unsigned data to be processed as though it were signed data.

Informaciones CAPEC

Prerrequisitos

Signer and recipient are using complex data storage structures that allow for a mix between signed and unsigned data
Recipient is using signature verification software that does not maintain separation between signed and unsigned data once the signature has been verified.

Habilidades requeridas

The attacker may need to continuously monitor a stream of signed data, waiting for an exploitable message to appear.
Attacker must be able to create malformed data blobs and know how to insert them in a location that the recipient will visit.

Mitigaciones

Ensure the application is fully patched and does not allow the processing of unsigned data as if it is signed data.

Debilidades relacionadas

CWE-ID Nombre de la debilidad

CWE-693

Protection Mechanism Failure
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.

CWE-311

Missing Encryption of Sensitive Data
The product does not encrypt sensitive or critical information before storage or transmission.

CWE-319

Cleartext Transmission of Sensitive Information
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.

Envío

Nombre Organización Fecha Fecha de lanzamiento
CAPEC Content Team The MITRE Corporation 2014-06-23 +00:00