Conditions préalables
Recipient is using signature verification software that does not clearly indicate potential homographs in the signer identity.Recipient is using signature verification software that contains a parsing vulnerability, or allows control characters in the signer identity field, such that a signature is mistakenly displayed as valid and from a known or authoritative signer.
Compétences requises
Attacker needs to understand the layout and composition of data blobs used by the target application.
To discover a specific vulnerability, attacker needs to reverse engineer signature parsing, signature verification and signer representation code.
Attacker may be required to create malformed data blobs and know how to insert them in a location that the recipient will visit.
Atténuations
Ensure the application is using parsing and data display techniques that will accurately display control characters, international symbols and markings, and ultimately recognize potential homograph attacks.
Faiblesses connexes
CWE-ID |
Nom de la faiblesse |
|
Authentication Bypass by Spoofing This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks. |
Références
REF-414
The state of homograph attacks
Eric Johanson.
Soumission
Nom |
Organisation |
Date |
Date de publication |
CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modifications
Nom |
Organisation |
Date |
Commentaire |
CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Weaknesses |