Some products use signed integers or floats even when their values are only expected to be positive or 0. An input validation check might assume that the value is positive, and only check for the maximum value. If the value is negative, but the code assumes that the value is positive, this can produce an error. The error may have security consequences if the negative value is used for memory allocation, array access, buffer access, etc. Ultimately, the error could lead to a buffer overflow or other type of memory corruption.
The use of a negative number in a positive-only context could have security implications for other types of resources. For example, a shopping cart might check that the user is not requesting more than 10 items, but a request for -3 items could cause the application to calculate a negative price and credit the attacker's account.
Scope | Impact | Likelihood |
---|---|---|
Integrity Confidentiality Availability | Modify Application Data, Execute Unauthorized Code or Commands Note: An attacker could modify the structure of the message or data being sent to the downstream component, possibly injecting commands. | |
Availability | DoS: Resource Consumption (Other) Note: in some contexts, a negative value could lead to resource consumption. | |
Confidentiality Integrity | Modify Memory, Read Memory Note: If a negative value is used to access memory, buffers, or other indexable structures, it could access memory outside the bounds of the buffer. |
References | Description |
---|---|
CVE-2010-1866 | Chain: integer overflow (CWE-190) causes a negative signed value, which later bypasses a maximum-only check (CWE-839), leading to heap-based buffer overflow (CWE-122). |
CVE-2009-1099 | Chain: 16-bit counter can be interpreted as a negative value, compared to a 32-bit maximum value, leading to buffer under-write. |
CVE-2011-0521 | Chain: kernel's lack of a check for a negative value leads to memory corruption. |
CVE-2010-3704 | Chain: parser uses atoi() but does not check for a negative value, which can happen on some platforms, leading to buffer under-write. |
CVE-2010-2530 | Chain: Negative value stored in an int bypasses a size check and causes allocation of large amounts of memory. |
CVE-2009-3080 | Chain: negative offset value to IOCTL bypasses check for maximum index, then used as an array index for buffer under-read. |
CVE-2008-6393 | chain: file transfer client performs signed comparison, leading to integer overflow and heap-based buffer overflow. |
CVE-2008-4558 | chain: negative ID in media player bypasses check for maximum index, then used as an array index for buffer under-read. |
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
CWE Content Team | MITRE | 1.12 |
Name | Organization | Date | Comment |
---|---|---|---|
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Demonstrative_Examples, References, Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Alternate_Terms, Description | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes | |
CWE Content Team | MITRE | updated Observed_Examples |