CWE-353 缺失完整性检查支持

admin 2022年1月2日04:09:13CWE(弱点枚举)评论18 views2212字阅读7分22秒阅读模式

CWE-353 缺失完整性检查支持

Missing Support for Integrity Check

结构: Simple

Abstraction: Base

状态: Draft

被利用可能性: Medium

基本描述

The software uses a transmission protocol that does not include a mechanism for verifying the integrity of the data during transmission, such as a checksum.

扩展描述

If integrity check values or "checksums" are omitted from a protocol, there is no way of determining if data has been corrupted in transmission. The lack of checksum functionality in a protocol removes the first application-level check of data that can be used. The end-to-end philosophy of checks states that integrity checks should be performed at the lowest level that they can be completely implemented. Excluding further sanity checks and input validation performed by applications, the protocol's checksum is the most important level of checksum, since it can be performed more completely than at any previous level and takes into account entire messages, as opposed to single packets.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 699 cwe_Ordinal: Primary

  • cwe_Nature: PeerOf cwe_CWE_ID: 354 cwe_View_ID: 1000

适用平台

Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}

常见的影响

范围 影响 注释
['Integrity', 'Other'] Other Data that is parsed and used may be corrupted.
['Non-Repudiation', 'Other'] ['Hide Activities', 'Other'] Without a checksum it is impossible to determine if any changes have been made to the data after it was sent.

可能的缓解方案

Architecture and Design

策略:

Add an appropriately sized checksum to the protocol, ensuring that data received may be simply validated before it is parsed and used.

Implementation

策略:

Ensure that the checksums present in the protocol design are properly implemented and added to each message before it is sent.

示例代码

In this example, a request packet is received, and privileged information is sent to the requester:

bad Java

while(true) {

DatagramPacket rp = new DatagramPacket(rData,rData.length);
outSock.receive(rp);
InetAddress IPAddress = rp.getAddress();
int port = rp.getPort();
out = secret.getBytes();
DatagramPacket sp =new DatagramPacket(out, out.length, IPAddress, port);
outSock.send(sp);

}

The response containing secret data has no integrity check associated with it, allowing an attacker to alter the message without detection.

分类映射

映射的分类名 ImNode ID Fit Mapped Node Name
CLASP Failure to add integrity check value

相关攻击模式

  • CAPEC-13
  • CAPEC-14
  • CAPEC-389
  • CAPEC-39
  • CAPEC-74
  • CAPEC-75

引用

文章来源于互联网:scap中文网

特别标注: 本站(CN-SEC.COM)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
  • 我的微信
  • 微信扫一扫
  • weinxin
  • 我的微信公众号
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2022年1月2日04:09:13
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                  CWE-353 缺失完整性检查支持 http://cn-sec.com/archives/612904.html

发表评论

匿名网友 填写信息

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: