[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195549

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Reliance on Data/Memory Layout

ID: 188Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: DRAFT
Abstraction Type: Base





Description

The software makes invalid assumptions about how protocol data or memory is organized at a lower level, resulting in unintended program behavior.

Likelihood of Exploit: Low

Applicable Platforms
Language: C
Language: C++

Time Of Introduction

  • Architecture and Design
  • Implementation

Common Consequences

ScopeTechnical ImpactNotes
Integrity
Confidentiality
 
Modify memory
Read memory
 
Can result in unintended modifications or exposure of sensitive memory.
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
Implementation
Architecture and Design
 
 In flat address space situations, never allow computing memory addresses as offsets from another memory address.
 
  
Architecture and Design
 
 Fully specify protocol layout unambiguously, providing a structured grammar (e.g., a compilable yacc grammar).
 
  
Testing
 
 Testing: Test that the implementation properly handles each case in the protocol grammar.
 
  

Relationships

Related CWETypeViewChain
CWE-188 ChildOf CWE-907 Category CWE-888  

Demonstrative Examples
None

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
CLASP  Reliance on data layout
 
 

References:

  1. Mark Dowd John McDonald Justin Schuh .The Art of Software Security Assessment 1st Edition. Addison Wesley. Section:'Chapter 6, "Structure Padding", Page 284.'. Published on 2006.

© SecPod Technologies