Scope | Impact | Likelihood |
---|---|---|
Confidentiality Integrity Availability | Read Memory, Execute Unauthorized Code or Commands Note: The case of an omitted null character is the most dangerous of the possible issues. This will almost certainly result in information disclosure, and possibly a buffer overflow condition, which may be exploited to execute arbitrary code. | |
Confidentiality Integrity Availability | DoS: Crash, Exit, or Restart, Read Memory, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory) Note: If a null character is omitted from a string, then most string-copying functions will read data until they locate a null character, even outside of the intended boundaries of the string. This could: cause a crash due to a segmentation fault cause sensitive adjacent memory to be copied and sent to an outsider trigger a buffer overflow when the copy is being written to a fixed-size buffer. | |
Integrity Availability | Modify Memory, DoS: Crash, Exit, or Restart Note: Misplaced null characters may result in any number of security problems. The biggest issue is a subset of buffer overflow, and write-what-where conditions, where data corruption occurs from the writing of a null character over valid data, or even instructions. A randomly placed null character may put the system into an undefined state, and therefore make it prone to crashing. A misplaced null character may corrupt other data in memory. | |
Integrity Confidentiality Availability Access Control Other | Alter Execution Logic, Execute Unauthorized Code or Commands Note: Should the null character corrupt the process flow, or affect a flag controlling access, it may lead to logical errors which allow for the execution of arbitrary code. |
References | Description |
---|---|
CVE-2000-0312 | Attacker does not null-terminate argv[] when invoking another program. |
CVE-2003-0777 | Interrupted step causes resultant lack of null termination. |
CVE-2004-1072 | Fault causes resultant lack of null termination, leading to buffer expansion. |
CVE-2001-1389 | Multiple vulnerabilities related to improper null termination. |
CVE-2003-0143 | Product does not null terminate a message buffer after snprintf-like call, leading to overflow. |
CVE-2009-2523 | Chain: product does not handle when an input string is not NULL terminated (CWE-170), leading to buffer over-read (CWE-125) or heap-based buffer overflow (CWE-122). |
Conceptually, this does not just apply to the C language; any language or representation that involves a terminator could have this type of problem.
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
PLOVER | Draft 3 |
Name | Organization | Date | Comment |
---|---|---|---|
Eric Dalci | Cigital | updated Time_of_Introduction | |
KDM Analytics | added/updated white box definitions | ||
CWE Content Team | MITRE | updated Applicable_Platforms, Causal_Nature, Common_Consequences, Description, Likelihood_of_Exploit, Maintenance_Notes, Relationships, Other_Notes, Relationship_Notes, Taxonomy_Mappings, Weakness_Ordinalities | |
CWE Content Team | MITRE | updated Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Demonstrative_Examples | |
KDM Analytics | Improved the White_Box_Definition | ||
CWE Content Team | MITRE | updated Common_Consequences, Other_Notes, Potential_Mitigations, White_Box_Definitions | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Observed_Examples | |
CWE Content Team | MITRE | updated Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Causal_Nature, Observed_Examples, Relationships, Taxonomy_Mappings, White_Box_Definitions | |
CWE Content Team | MITRE | updated Demonstrative_Examples | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated Detection_Factors, Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes |