Dark Mode
Capec-123 Detail
Buffer Manipulation
Meta Software Likelihood: High Typical Severity: Very High
Children: 100 540
Threats: T62
An adversary manipulates an application's interaction with a buffer in an attempt to read or modify data they shouldn't have access to. Buffer attacks are distinguished in that it is the buffer space itself that is the target of the attack rather than any code responsible for interpreting the content of the buffer. In virtually all buffer attacks the content that is placed in the buffer is immaterial. Instead, most buffer attacks involve retrieving or providing more input than can be stored in the allocated buffer, resulting in the reading or overwriting of other unintended program memory.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-123 | capec | https://capec.mitre.org/data/definitions/123.html | |
| CWE-119 | cwe | http://cwe.mitre.org/data/definitions/119.html |
Not present
- The adversary must identify a programmatic means for interacting with a buffer, such as vulnerable C code, and be able to provide input to this interaction.
Not present
Not present
| Availability | Confidentiality |
|---|---|
| Unreliable Execution (A buffer manipulation attack often results in a crash of the application due to the corruption of memory.) | Execute Unauthorized Commands (If constructed properly, a buffer manipulation attack can be used to contol the execution of the application leading to any number of negative consequenses.) |
| Modify Data (If constructed properly, a buffer manipulation attack can be used to contol the execution of the application leading to any number of negative consequenses.) | |
| Read Data (If constructed properly, a buffer manipulation attack can be used to contol the execution of the application leading to any number of negative consequenses.) |
Not present