CWE-69 Windows::DATA交换数据流处理不恰当
Improper Handling of Windows ::DATA Alternate Data Stream
结构: Simple
Abstraction: Variant
状态: Incomplete
被利用可能性: unkown
基本描述
The software does not properly prevent access to, or detect usage of, alternate data streams (ADS).
扩展描述
An attacker can use an ADS to hide information about a file (e.g. size, the name of the process) from a system or file browser tools such as Windows Explorer and 'dir' at the command line utility. Alternately, the attacker might be able to bypass intended access restrictions for the associated data fork.
相关缺陷
-
cwe_Nature: ChildOf cwe_CWE_ID: 66 cwe_View_ID: 1000 cwe_Ordinal: Primary
-
cwe_Nature: ChildOf cwe_CWE_ID: 66 cwe_View_ID: 699 cwe_Ordinal: Primary
适用平台
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
Operating_System: {'cwe_Class': 'Windows', 'cwe_Prevalence': 'Undetermined'}
常见的影响
范围 | 影响 | 注释 |
---|---|---|
['Access Control', 'Non-Repudiation', 'Other'] | ['Bypass Protection Mechanism', 'Hide Activities', 'Other'] |
可能的缓解方案
Testing
策略:
Software tools are capable of finding ADSs on your system.
Implementation
策略:
Ensure that the source code correctly parses the filename to read or write to the correct stream.
分析过的案例
标识 | 说明 | 链接 |
---|---|---|
CVE-1999-0278 | In IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0278 |
CVE-2000-0927 | Product does not properly record file sizes if they are stored in alternative data streams, which allows users to bypass quota restrictions. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0927 |
Notes
分类映射
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Windows ::DATA alternate data stream |
相关攻击模式
- CAPEC-168
引用
文章来源于互联网:scap中文网
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论