Prerequisites
The target must be running the Microsoft NTFS file system.
Resources Required
The attacker must have command line or programmatic access to the target's files system with write/read permissions.
Mitigations
Design: Use FAT file systems which do not support Alternate Data Streams.
Implementation: Use Vista dir with the -R switch or utility to find Alternate Data Streams and take appropriate action with those discovered.
Implementation: Use products that are Alternate Data Stream aware for virus scanning and system security operations.
Related Weaknesses
CWE-ID |
Weakness Name |
|
Improper Removal of Sensitive Information Before Storage or Transfer The product stores, transfers, or shares a resource that contains sensitive information, but it does not properly remove that information before the product makes the resource available to unauthorized actors. |
|
Improper Handling of Windows ::DATA Alternate Data Stream The product does not properly prevent access to, or detect usage of, alternate data streams (ADS). |
Submission
Name |
Organization |
Date |
Date release |
CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modifications
Name |
Organization |
Date |
Comment |
CAPEC Content Team |
The MITRE Corporation |
2017-08-04 +00:00 |
Updated Resources_Required |
CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Related_Attack_Patterns, Resources_Required |
CAPEC Content Team |
The MITRE Corporation |
2020-12-17 +00:00 |
Updated Taxonomy_Mappings |