CWE-354 完整性检查值验证不恰当
Improper Validation of Integrity Check Value
结构: Simple
Abstraction: Base
状态: Draft
被利用可能性: Medium
基本描述
The software does not validate or incorrectly validates the integrity check values or "checksums" of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission.
扩展描述
Improper validation of checksums before use results in an unnecessary risk that can easily be mitigated. The protocol specification describes the algorithm used for calculating the checksum. It is then a simple matter of implementing the calculation and verifying that the calculated checksum and the received checksum match. Improper verification of the calculated checksum and the received checksum can lead to far greater consequences.
相关缺陷
-
cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 1000 cwe_Ordinal: Primary
-
cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 1003 cwe_Ordinal: Primary
-
cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 699 cwe_Ordinal: Primary
-
cwe_Nature: ChildOf cwe_CWE_ID: 754 cwe_View_ID: 1000
-
cwe_Nature: PeerOf cwe_CWE_ID: 353 cwe_View_ID: 1000
适用平台
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
常见的影响
范围 | 影响 | 注释 |
---|---|---|
['Integrity', 'Other'] | ['Modify Application Data', 'Other'] | Integrity checks usually use a secret key that helps authenticate the data origin. Skipping integrity checking generally opens up the possibility that new data from an invalid source can be injected. |
['Integrity', 'Other'] | Other | Data that is parsed and used may be corrupted. |
['Non-Repudiation', 'Other'] | ['Hide Activities', 'Other'] | Without a checksum check, it is impossible to determine if any changes have been made to the data after it was sent. |
可能的缓解方案
Implementation
策略:
Ensure that the checksums present in messages are properly checked in accordance with the protocol specification before they are parsed and used.
示例代码
例
The following example demonstrates the weakness.
bad C
serv.sin_addr.s_addr = htonl(INADDR_ANY);
servr.sin_port = htons(1008);
bind(sd, (struct sockaddr ) & serv, sizeof(serv));
while (1) {
memset(msg, 0x0, MAX_MSG);
clilen = sizeof(cli);
if (inet_ntoa(cli.sin_addr)==...) n = recvfrom(sd, msg, MAX_MSG, 0, (struct sockaddr ) & cli, &clilen);
}
bad Java
socket.send(sendPacket);
}
分类映射
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
CLASP | Failure to check integrity check value |
相关攻击模式
- CAPEC-145
- CAPEC-463
- CAPEC-75
文章来源于互联网:scap中文网
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论