CAPEC-263: Force Use of Corrupted Files
ID
CAPEC-263
Typical Severity
Medium
Status
Draft
This describes an attack where an application is forced to use a file that an attacker has corrupted. The result is often a denial of service caused by the application being unable to process the corrupted file, but other results, including the disabling of filters or access controls (if the application fails in an unsafe way rather than failing by locking down) or buffer overflows are possible.
Weaknesses
# ID | Name | Type |
---|---|---|
CWE-829 | Inclusion of Functionality from Untrusted Control Sphere | weakness |