CWE-636 未能安全地进行程序失效(Failing Open)

admin 2021年12月16日16:26:44评论78 views字数 2477阅读8分15秒阅读模式

CWE-636 未能安全地进行程序失效(Failing Open)

Not Failing Securely ('Failing Open')

结构: Simple

Abstraction: Class

状态: Draft

被利用可能性: unkown

基本描述

When the product encounters an error condition or failure, its design requires it to fall back to a state that is less secure than other options that are available, such as selecting the weakest encryption algorithm or using the most permissive access control restrictions.

扩展描述

By entering a less secure state, the product inherits the weaknesses associated with that state, making it easier to compromise. At the least, it causes administrators to have a false sense of security. This weakness typically occurs as a result of wanting to "fail functional" to minimize administration and support costs, instead of "failing safe."

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 657 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 657 cwe_View_ID: 699 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 755 cwe_View_ID: 1000

  • cwe_Nature: PeerOf cwe_CWE_ID: 280 cwe_View_ID: 1000

适用平台

Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}

常见的影响

范围 影响 注释
Access Control Bypass Protection Mechanism Intended access restrictions can be bypassed, which is often contradictory to what the product's administrator expects.

可能的缓解方案

Architecture and Design

策略:

Subdivide and allocate resources and components so that a failure in one part does not affect the entire product.

示例代码

Switches may revert their functionality to that of hubs when the table used to map ARP information to the switch interface overflows, such as when under a spoofing attack. This results in traffic being broadcast to an eavesdropper, instead of being sent only on the relevant switch interface. To mitigate this type of problem, the developer could limit the number of ARP entries that can be recorded for a given switch interface, while other interfaces may keep functioning normally. Configuration options can be provided on the appropriate actions to be taken in case of a detected failure, but safe defaults should be used.

分析过的案例

标识 说明 链接
CVE-2007-5277 The failure of connection attempts in a web browser resets DNS pin restrictions. An attacker can then bypass the same origin policy by rebinding a domain name to a different IP address. This was an attempt to "fail functional." https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5277
CVE-2006-4407 Incorrect prioritization leads to the selection of a weaker cipher. Although it is not known whether this issue occurred in implementation or design, it is feasible that a poorly designed algorithm could be a factor. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4407

Notes

分类映射

映射的分类名 ImNode ID Fit Mapped Node Name
OWASP Top Ten 2004 A7 CWE More Specific Improper Error Handling

引用

文章来源于互联网:scap中文网

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年12月16日16:26:44
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CWE-636 未能安全地进行程序失效(Failing Open)http://cn-sec.com/archives/613071.html

发表评论

匿名网友 填写信息