Home > CAPEC List > CAPEC-540: Overread Buffers (Version 2.9)  

CAPEC-540: Overread Buffers

 
Overread Buffers
Definition in a New Window Definition in a New Window
Attack Pattern ID: 540
Abstraction: Standard
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.

+ Attack Prerequisites
  • For this type of attack to be successful, a few prerequisites must be met. First, the targeted software must be written in a language that enables fine grained buffer control. (e.g., c, c++) Second, the targeted software must actually perform buffer operations and inadequately perform bounds-checking on those buffer operations. Finally, the adversary must have the capability to influence the input that guides these buffer operations.

+ Typical Severity

High

+ Typical Likelihood of Exploit

Likelihood: Low

+ Attack Motivation-Consequences
ScopeTechnical ImpactNote
Confidentiality
Read memory
By reading outside the boundary of the intended buffer, the adversary is potentially able to see any data that is stored on the disk. This could include secret keys, personal information, and sensitive files.
Availability
DoS: crash / exit / restart
Depending on the use of the target buffer, an application or system crash can be achieved.
+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team

More information is available — Please select a different filter.
Page Last Updated or Reviewed: December 07, 2015