logo

CWE-806 - Buffer Access Using Size of Source Buffer

CWE-806

  • Abstraction:
  • Variant
  • Structure:
  • Simple
  • Status:
  • Incomplete
Weakness Name

Buffer Access Using Size of Source Buffer

Description

The product uses the size of a source buffer when reading from or writing to a destination buffer, which may cause it to access memory that is outside of the bounds of the buffer.

When the size of the destination is smaller than the size of the source, a buffer overflow could occur.

Common Consequences

Scope: Availability

Impact: Modify Memory, DoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU)

Notes: Buffer overflows generally lead to crashes. Other attacks leading to lack of availability are possible, including putting the program into an infinite loop.

Scope: Integrity, Confidentiality, Availability

Impact: Read Memory, Modify Memory, Execute Unauthorized Code or Commands

Notes: Buffer overflows often can be used to execute arbitrary code, which is usually outside the scope of a program's implicit security policy.

Scope: Access Control

Impact: Bypass Protection Mechanism

Notes: When the consequence is arbitrary code execution, this can often be used to subvert any other security service.

Related Weaknesses
  • Release Date:
  • 2010-02-16
  • Latest Modification Date:
  • 2023-06-29

Free security scan for your website