CWE-135 - Incorrect Calculation of Multi-Byte String Length
CWE-135
- Abstraction:
- Base
- Structure:
- Simple
- Status:
- Draft
- Weakness Name
Incorrect Calculation of Multi-Byte String Length
- Description
The product does not correctly calculate the length of strings that can contain wide or multi-byte characters.
- Common Consequences
Scope: Integrity, Confidentiality, Availability
Impact: Execute Unauthorized Code or Commands
Notes: This weakness may lead to a buffer overflow. Buffer overflows often can be used to execute arbitrary code, which is usually outside the scope of a program's implicit security policy. This can often be used to subvert any other security service.
Scope: Availability, Confidentiality
Impact: Read Memory, DoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory)
Notes: Out of bounds memory access will very likely result in the corruption of relevant memory, and perhaps instructions, possibly leading to a crash. Other attacks leading to lack of availability are possible, including putting the program into an infinite loop.
Scope: Confidentiality
Impact: Read Memory
Notes: In the case of an out-of-bounds read, the attacker may have access to sensitive information. If the sensitive information contains system details, such as the current buffer's position in memory, this knowledge can be used to craft further attacks, possibly with more severe consequences.
- Related Weaknesses
- Release Date:
- 2006-07-19
- Latest Modification Date:
- 2024-07-16
Free security scan for your website