Modes d'introduction
Implementation : REALIZATION: This weakness is caused during implementation of an architectural security tactic.
Plateformes applicables
Langue
Name: C (Undetermined)
Class: Not Language-Specific (Undetermined)
Systèmes d’exploitation
Class: Unix (Undetermined)
Conséquences courantes
Portée |
Impact |
Probabilité |
Confidentiality Integrity | Read Application Data, Modify Application Data | |
Exemples observés
Références |
Description |
| Server leaks a privileged file descriptor, allowing the server to be hijacked. |
| File descriptor leak allows read of restricted files. |
| Access to restricted resource using modified file descriptor for stderr. |
| Open file descriptor used as alternate channel in complex race condition. |
| Program does not fully drop privileges after creating a file descriptor, which allows access to the descriptor via a separate vulnerability. |
| User bypasses restrictions by obtaining a file descriptor then calling setuid program, which does not close the descriptor. |
| Terminal manager does not properly close file descriptors, allowing attackers to access terminals of other users. |
| Module opens a file for reading twice, allowing attackers to read files. |
Notes de cartographie des vulnérabilités
Justification : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Commentaire : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Références
REF-392
File descriptors and setuid applications
Paul Roberts.
https://blogs.oracle.com/paulr/entry/file_descriptors_and_setuid_applications REF-393
Introduction to Secure Coding Guide
Apple.
https://developer.apple.com/library/archive/documentation/Security/Conceptual/SecureCodingGuide/Articles/AccessControl.html
Soumission
Nom |
Organisation |
Date |
Date de publication |
Version |
PLOVER |
|
2006-07-19 +00:00 |
2006-07-19 +00:00 |
Draft 3 |
Modifications
Nom |
Organisation |
Date |
Commentaire |
Eric Dalci |
Cigital |
2008-07-01 +00:00 |
updated Time_of_Introduction |
CWE Content Team |
MITRE |
2008-09-08 +00:00 |
updated Applicable_Platforms, Relationships, Taxonomy_Mappings |
CWE Content Team |
MITRE |
2008-11-24 +00:00 |
updated Affected_Resources, Observed_Examples, Relationships, Taxonomy_Mappings |
CWE Content Team |
MITRE |
2011-03-29 +00:00 |
updated Name |
CWE Content Team |
MITRE |
2011-06-01 +00:00 |
updated Common_Consequences |
CWE Content Team |
MITRE |
2011-06-27 +00:00 |
updated Common_Consequences |
CWE Content Team |
MITRE |
2011-09-13 +00:00 |
updated Relationships, Taxonomy_Mappings |
CWE Content Team |
MITRE |
2012-05-11 +00:00 |
updated Relationships |
CWE Content Team |
MITRE |
2013-02-21 +00:00 |
updated Alternate_Terms, Description, Name, Observed_Examples, References |
CWE Content Team |
MITRE |
2014-07-30 +00:00 |
updated Relationships, Taxonomy_Mappings |
CWE Content Team |
MITRE |
2017-11-08 +00:00 |
updated Affected_Resources, Applicable_Platforms, Modes_of_Introduction, References, Relationships, Taxonomy_Mappings |
CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Relationships |
CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated References, Relationships, Time_of_Introduction |
CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
CWE Content Team |
MITRE |
2025-04-03 +00:00 |
updated Applicable_Platforms |