Modes Of Introduction
Architecture and Design
Implementation : REALIZATION: This weakness is caused during implementation of an architectural security tactic.
Applicable Platforms
Language
Class: Not Language-Specific (Undetermined)
Technologies
Class: Mobile (Undetermined)
Observed Examples
References |
Description |
| composite: NTP feature generates large responses (high amplification factor) with spoofed UDP source addresses. |
| Classic "Smurf" attack, using spoofed ICMP packets to broadcast addresses. |
| DNS query with spoofed source address causes more traffic to be returned to spoofed address than was sent by the attacker. |
Vulnerability Mapping Notes
Justification : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Comment : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
References
REF-941
UDP-based Amplification Attacks
US-CERT.
https://www.us-cert.gov/ncas/alerts/TA14-017A REF-942
Android Bad Practices: Sticky Broadcast
Fortify.
https://www.hpe.com/us/en/solutions/infrastructure-security.html?jumpid=va_wnmstr1ug6_aid-510326901
Submission
Name |
Organization |
Date |
Date release |
Version |
CWE Content Team |
MITRE |
2014-02-13 +00:00 |
2014-02-19 +00:00 |
2.6 |
Modifications
Name |
Organization |
Date |
Comment |
CWE Content Team |
MITRE |
2017-11-08 +00:00 |
updated Modes_of_Introduction, References, Relationships |
CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Applicable_Platforms, Relationships |
CWE Content Team |
MITRE |
2021-03-15 +00:00 |
updated Maintenance_Notes |
CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Description |
CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated References, Relationships |
CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |