CWE-573 调用者对规范的不恰当使用
Improper Following of Specification by Caller
结构: Simple
Abstraction: Class
状态: Draft
被利用可能性: unkown
基本描述
The software does not follow or incorrectly follows the specifications as required by the implementation language, environment, framework, protocol, or platform.
扩展描述
When leveraging external functionality, such as an API, it is important that the caller does so in accordance with the requirements of the external functionality or else unintended behaviors may result, possibly leaving the system vulnerable to any number of exploits.
相关缺陷
- cwe_Nature: ChildOf cwe_CWE_ID: 710 cwe_View_ID: 1000 cwe_Ordinal: Primary
常见的影响
范围 | 影响 | 注释 |
---|---|---|
Other | ['Quality Degradation', 'Varies by Context'] |
分析过的案例
标识 | 说明 | 链接 |
---|---|---|
CVE-2006-7140 | Crypto implementation removes padding when it shouldn't, allowing forged signatures | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7140 |
CVE-2006-4339 | Crypto implementation removes padding when it shouldn't, allowing forged signatures | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 |
分类映射
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
The CERT Oracle Secure Coding Standard for Java (2011) | MET10-J | Follow the general contract when implementing the compareTo() method |
文章来源于互联网:scap中文网
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论