| Home > CAPEC List > CAPEC-92: Forced Integer Overflow (Version 3.9) |
|
High
High
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 128 | Integer Attacks |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software |
| Mechanisms of Attack | Manipulate Data Structures |
| Scope | Impact | Likelihood |
|---|---|---|
Integrity | Modify Data | |
Confidentiality Access Control Authorization | Gain Privileges | |
Confidentiality Integrity Availability | Execute Unauthorized Commands | |
Confidentiality | Read Data | |
Availability | Unreliable Execution |
The following code illustrates an integer overflow. The declaration of total integer as "unsigned short int" assumes that the length of the first and second arguments fits in such an integer [REF-547], [REF-548].
| CWE-ID | Weakness Name |
|---|---|
| 190 | Integer Overflow or Wraparound |
| 128 | Wrap-around Error |
| 120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
| 122 | Heap-based Buffer Overflow |
| 196 | Unsigned to Signed Conversion Error |
| 680 | Integer Overflow to Buffer Overflow |
| 697 | Incorrect Comparison |
| Entry ID | Entry Name |
|---|---|
| 03 | Integer Overflows |
| Submissions | ||
|---|---|---|
| Submission Date | Submitter | Organization |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation |
| Modifications | ||
| Modification Date | Modifier | Organization |
| 2018年07月31日 (Version 2.12) | CAPEC Content Team | The MITRE Corporation |
| Updated References | ||
| 2020年07月30日 (Version 3.3) | CAPEC Content Team | The MITRE Corporation |
| Updated Example_Instances, Execution_Flow | ||
| 2020年12月17日 (Version 3.4) | CAPEC Content Team | The MITRE Corporation |
| Updated Mitigations, References, Taxonomy_Mappings | ||
| 2022年09月29日 (Version 3.8) | CAPEC Content Team | The MITRE Corporation |
| Updated Example_Instances | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||