CWE-422 未保护的Windows消息通道(Shatter)

Unprotected Windows Messaging Channel ('Shatter')

结构: Simple

Abstraction: Variant

状态: Draft

被利用可能性: unkown


The software does not properly verify the source of a message in the Windows Messaging System while running at elevated privileges, creating an alternate channel through which an attacker can directly send a message to the product.


  • cwe_Nature: ChildOf cwe_CWE_ID: 420 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 420 cwe_View_ID: 699 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 360 cwe_View_ID: 1000


Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}


范围 影响 注释
Access Control ['Gain Privileges or Assume Identity', 'Bypass Protection Mechanism']


Architecture and Design


Always verify and authenticate the source of the message.


标识 说明 链接
CVE-2002-0971 Bypass GUI and access restricted dialog box.
CVE-2002-1230 Gain privileges via Windows message.
CVE-2003-0350 A control allows a change to a pointer for a callback function using Windows message.
CVE-2003-0908 Product launches Help functionality while running with raised privileges, allowing command execution using Windows message to access "open file" dialog.
CVE-2004-0213 Attacker uses Shatter attack to bypass GUI-enforced protection for CVE-2003-0908.
CVE-2004-0207 User can call certain API functions to modify certain properties of privileged programs.


Relationship Overlaps privilege errors and UI errors. Research Gap


映射的分类名 ImNode ID Fit Mapped Node Name
PLOVER Unprotected Windows Messaging Channel ('Shatter')
Software Fault Patterns SFP30 Missing endpoint authentication