CAPEC-67: String Format Overflow in syslog()

ID CAPEC-67
Typical Severity Very High
Likelihood Of Attack High
Status Draft

This attack targets applications and software that uses the syslog() function insecurely. If an application does not explicitely use a format string parameter in a call to syslog(), user input can be placed in the format string parameter leading to a format string injection attack. Adversaries can then inject malicious format string commands into the function call leading to a buffer overflow. There are many reported software vulnerabilities with the root cause being a misuse of the syslog() function.

https://capec.mitre.org/data/definitions/67.html

Weaknesses

# ID Name Type
CWE-20 Improper Input Validation weakness
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') weakness
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') weakness
CWE-134 Use of Externally-Controlled Format String weakness
CWE-680 Integer Overflow to Buffer Overflow weakness
CWE-697 Incorrect Comparison weakness

Taxonomiy Mapping

Type # ID Name
WASC 06 Format String
Loading...