[Identify target application] The adversary identifies a target application or program to perform the buffer overread on. Adversaries often look for applications that accept user input and that perform manual memory management.
[Find attack vector] The adversary identifies an attack vector by looking for areas in the application where they can specify to read more data than is required.
[Overread the buffer] The adversary provides input to the application that gets it to read past the bounds of a buffer, possibly revealing sensitive information that was not intended to be given to the adversary.
Nom de la faiblesse | |
---|---|
CWE-125 |
Out-of-bounds Read The product reads data past the end, or before the beginning, of the intended buffer. |
Nom | Organisation | Date | Date de publication |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation |
Nom | Organisation | Date | Commentaire |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation | Updated Execution_Flow |