Prerequisites
Recipient is using signature verification software that does not clearly indicate potential homographs in the signer identity.Recipient is using signature verification software that contains a parsing vulnerability, or allows control characters in the signer identity field, such that a signature is mistakenly displayed as valid and from a known or authoritative signer.
Skills Required
Attacker needs to understand the layout and composition of data blobs used by the target application.
To discover a specific vulnerability, attacker needs to reverse engineer signature parsing, signature verification and signer representation code.
Attacker may be required to create malformed data blobs and know how to insert them in a location that the recipient will visit.
Mitigations
Ensure the application is using parsing and data display techniques that will accurately display control characters, international symbols and markings, and ultimately recognize potential homograph attacks.
Related Weaknesses
CWE-ID |
Weakness Name |
|
Authentication Bypass by Spoofing This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks. |
References
REF-414
The state of homograph attacks
Eric Johanson.
Submission
Name |
Organization |
Date |
Date release |
CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modifications
Name |
Organization |
Date |
Comment |
CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Weaknesses |