CWE-318 在可执行体中的明文存储
Cleartext Storage of Sensitive Information in Executable
结构: Simple
Abstraction: Variant
状态: Draft
被利用可能性: unkown
基本描述
The application stores sensitive information in cleartext in an executable.
扩展描述
Attackers can reverse engineer binary code to obtain secret data. This is especially easy when the cleartext is plain ASCII. Even if the information is encoded in a way that is not human-readable, certain techniques could determine which encoding is being used, then decode the information.
相关缺陷
-
cwe_Nature: ChildOf cwe_CWE_ID: 312 cwe_View_ID: 1000 cwe_Ordinal: Primary
-
cwe_Nature: ChildOf cwe_CWE_ID: 312 cwe_View_ID: 699 cwe_Ordinal: Primary
适用平台
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
常见的影响
范围 | 影响 | 注释 |
---|---|---|
Confidentiality | Read Application Data |
分析过的案例
标识 | 说明 | 链接 |
---|---|---|
CVE-2005-1794 | Product stores RSA private key in a DLL and uses it to sign a certificate, allowing spoofing of servers and MITM attacks. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1794 |
CVE-2001-1527 | administration passwords in cleartext in executable | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1527 |
Notes
分类映射
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Plaintext Storage in Executable |
相关攻击模式
- CAPEC-37
- CAPEC-65
文章来源于互联网:scap中文网
- 左青龙
- 微信扫一扫
- 右白虎
- 微信扫一扫
评论