| Escopo | Impacto | Probabilidade |
|---|---|---|
| Confidentiality Access Control | Read Application Data, Bypass Protection Mechanism |
| Referências | Descrição |
|---|---|
CVE-2002-2094 | This, and others, use ".." attacks and monitor error responses, so there is overlap with directory traversal. |
CVE-2001-1483 | Enumeration of valid usernames based on inconsistent responses |
CVE-2001-1528 | Account number enumeration via inconsistent responses. |
CVE-2004-2150 | User enumeration via discrepancies in error messages. |
CVE-2005-1650 | User enumeration via discrepancies in error messages. |
CVE-2004-0294 | Bulletin Board displays different error messages when a user exists or not, which makes it easier for remote attackers to identify valid users and conduct a brute force password guessing attack. |
CVE-2004-0243 | Operating System, when direct remote login is disabled, displays a different message if the password is correct, which allows remote attackers to guess the password via brute force methods. |
CVE-2002-0514 | Product allows remote attackers to determine if a port is being filtered because the response packet TTL is different than the default TTL. |
CVE-2002-0515 | Product sets a different TTL when a port is being filtered than when it is not being filtered, which allows remote attackers to identify filtered ports by comparing TTLs. |
CVE-2001-1387 | Product may generate different responses than specified by the administrator, possibly leading to an information leak. |
CVE-2004-0778 | Version control system allows remote attackers to determine the existence of arbitrary files and directories via the -X command for an alternate history file, which causes different error messages to be returned. |
CVE-2004-1428 | FTP server generates an error message if the user name does not exist instead of prompting for a password, which allows remote attackers to determine valid usernames. |
| CAPEC-ID | Nome do Padrão de Ataque |
|---|---|
| CAPEC-331 | ICMP IP Total Length Field Probe
An adversary sends a UDP packet to a closed port on the target machine to solicit an IP Header's total length field value within the echoed 'Port Unreachable" error message. This type of behavior is useful for building a signature-base of operating system responses, particularly when error messages contain other types of information that is useful identifying specific operating system responses. |
| CAPEC-332 | ICMP IP 'ID' Field Error Message Probe
An adversary sends a UDP datagram having an assigned value to its internet identification field (ID) to a closed port on a target to observe the manner in which this bit is echoed back in the ICMP error message. This allows the attacker to construct a fingerprint of specific OS behaviors. |
| CAPEC-541 | Application Fingerprinting
An adversary engages in fingerprinting activities to determine the type or version of an application installed on a remote target. |
| CAPEC-580 | System Footprinting
An adversary engages in active probing and exploration activities to determine security information about a remote target system. Often times adversaries will rely on remote applications that can be probed for system configurations. |
| Nome | Organização | Data | Data de lançamento | Version |
|---|---|---|---|---|
| PLOVER | Draft 3 |
| Nome | Organização | Data | Comentário |
|---|---|---|---|
| Eric Dalci | Cigital | updated Potential_Mitigations, Time_of_Introduction | |
| CWE Content Team | MITRE | updated Relationships, Relationship_Notes, Taxonomy_Mappings | |
| CWE Content Team | MITRE | updated Description, Potential_Mitigations | |
| CWE Content Team | MITRE | updated Demonstrative_Examples | |
| CWE Content Team | MITRE | updated Description, Name, Observed_Examples | |
| CWE Content Team | MITRE | updated Common_Consequences | |
| CWE Content Team | MITRE | updated Demonstrative_Examples, Observed_Examples, References, Relationships | |
| CWE Content Team | MITRE | updated Potential_Mitigations | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Applicable_Platforms | |
| CWE Content Team | MITRE | updated Description, Name, Relationships | |
| CWE Content Team | MITRE | updated Potential_Mitigations | |
| CWE Content Team | MITRE | updated Related_Attack_Patterns | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Mapping_Notes | |
| CWE Content Team | MITRE | updated Description, Diagram, Modes_of_Introduction | |
| CWE Content Team | MITRE | updated Weakness_Ordinalities |