| Zakres | Wpływ | Prawdopodobieństwo |
|---|---|---|
| Access Control Other | Gain Privileges or Assume Identity, Varies by Context, Bypass Protection Mechanism Note: An attacker can access any functionality that is inadvertently accessible to the source. |
| Odniesienia | Opis |
|---|---|
CVE-2000-1218 | DNS server can accept DNS updates from hosts that it did not query, leading to cache poisoning |
CVE-2005-0877 | DNS server can accept DNS updates from hosts that it did not query, leading to cache poisoning |
CVE-2001-1452 | DNS server caches glue records received from non-delegated name servers |
| CAPEC-ID | Nazwa wzorca ataku |
|---|---|
| CAPEC-500 | WebView Injection
An adversary, through a previously installed malicious application, injects code into the context of a web page displayed by a WebView component. Through the injected code, an adversary is able to manipulate the DOM tree and cookies of the page, expose sensitive information, and can launch attacks against the web application from within the web page. |
| CAPEC-594 | Traffic Injection
An adversary injects traffic into the target's network connection. The adversary is therefore able to degrade or disrupt the connection, and potentially modify the content. This is not a flooding attack, as the adversary is not focusing on exhausting resources. Instead, the adversary is crafting a specific input to affect the system in a particular way. |
| CAPEC-595 | Connection Reset
In this attack pattern, an adversary injects a connection reset packet to one or both ends of a target's connection. The attacker is therefore able to have the target and/or the destination server sever the connection without having to directly filter the traffic between them. |
| CAPEC-596 | TCP RST Injection
An adversary injects one or more TCP RST packets to a target after the target has made a HTTP GET request. The goal of this attack is to have the target and/or destination web server terminate the TCP connection. |
| Nazwa | Organizacja | Data | Data wydania | Version |
|---|---|---|---|---|
| CWE Content Team | MITRE | 2.6 |
| Nazwa | Organizacja | Data | Komentarz |
|---|---|---|---|
| CWE Content Team | MITRE | updated Modes_of_Introduction, References, Relationships | |
| CWE Content Team | MITRE | updated Related_Attack_Patterns | |
| CWE Content Team | MITRE | updated Applicable_Platforms, Potential_Mitigations, Relationships | |
| CWE Content Team | MITRE | updated Demonstrative_Examples, Potential_Mitigations | |
| CWE Content Team | MITRE | updated Potential_Mitigations | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Description, Related_Attack_Patterns | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Mapping_Notes, Relationships | |
| CWE Content Team | MITRE | updated References | |
| CWE Content Team | MITRE | updated Common_Consequences, Relationships, Weakness_Ordinalities |