CWE-806 - Buffer Access Using Size of Source Buffer
CWE-806
- Abstraction:
- Variant
- Structure:
- Simple
- Status:
- Incomplete
- Weakness Name
Buffer Access Using Size of Source Buffer
- Description
The product uses the size of a source buffer when reading from or writing to a destination buffer, which may cause it to access memory that is outside of the bounds of the buffer.
When the size of the destination is smaller than the size of the source, a buffer overflow could occur.
- Common Consequences
Scope: Availability
Impact: Modify Memory, DoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU)
Notes: Buffer overflows generally lead to crashes. Other attacks leading to lack of availability are possible, including putting the program into an infinite loop.
Scope: Integrity, Confidentiality, Availability
Impact: Read Memory, Modify Memory, Execute Unauthorized Code or Commands
Notes: Buffer overflows often can be used to execute arbitrary code, which is usually outside the scope of a program's implicit security policy.
Scope: Access Control
Impact: Bypass Protection Mechanism
Notes: When the consequence is arbitrary code execution, this can often be used to subvert any other security service.
- Related Weaknesses
- Release Date:
- 2010-02-16
- Latest Modification Date:
- 2023-06-29
Free security scan for your website