For each of the “even” numbered software errors discussed on http://cwe.mitre.or
ID: 3686056 • Letter: F
Question
For each of the “even” numbered software errors discussed on
http://cwe.mitre.org/top25/
Provide an example of a real attack. A reference to the attack description (URL) and one sentence description will be adequate.
Example:
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
http://www.debian.org/security/2004/dsa-469
Bug in a library libpam-pgsql, a Plugable Authentication Module (PAM) module. The input from user is not filtered to filter out dangerous charcaters/non-characters so that SQL injection attack is possible.
Using 2 level languge
Explanation / Answer
1.CWE-78
Improper Neutralization of Special Elements used in an OS Command
https://www.owasp.org/index.php/Command_Injection
OS command injection:This is an attack in which the attacker executed arbitrary commands on a host operating system with the help of a vulnerable application.
2.CWE-120:Buffer Copy without Checking Size of Input
https://www.owasp.org/index.php/Buffer_Overflow
classic buffer overflow attack:In this attack,The attacker sends the data to the program which is stored in an undersized stack buffer now,The information on the calls tack is overwritten including the return pointer of the function.As a result the data sets the value of the return pointer so that when the function returns,it transfers the control to malicious code.
3.CWE 352 Cross-Site Request Forgery (CSRF)
http://www.veracode.com/security/csrf
This is a kind of an attack where the malicious website will send a request to the web application that a user is already authenticated against from a different website.
4,CWE-798
https://cwe.mitre.org/data/definitions/259.html
Use of hardcoded credentials: it leads to authentication failure as system administrator is unable to detect it.
5.CWE-676
https://cwe.mitre.org/data/definitions/676.html
The program invokes a potentially dangerous function that could introduce a vulnerability if it is used incorrectly, but the function can also be used safely.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.