结构: Simple
Abstraction: Variant
状态: Draft
被利用可能性: unkown
The software does not properly verify the source of a message in the Windows Messaging System while running at elevated privileges, creating an alternate channel through which an attacker can directly send a message to the product.
cwe_Nature: ChildOf cwe_CWE_ID: 420 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 420 cwe_View_ID: 699 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 360 cwe_View_ID: 1000
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
Access Control | ['Gain Privileges or Assume Identity', 'Bypass Protection Mechanism'] |
策略:
Always verify and authenticate the source of the message.
标识 | 说明 | 链接 |
---|---|---|
CVE-2002-0971 | Bypass GUI and access restricted dialog box. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0971 |
CVE-2002-1230 | Gain privileges via Windows message. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1230 |
CVE-2003-0350 | A control allows a change to a pointer for a callback function using Windows message. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0350 |
CVE-2003-0908 | Product launches Help functionality while running with raised privileges, allowing command execution using Windows message to access "open file" dialog. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0908 |
CVE-2004-0213 | Attacker uses Shatter attack to bypass GUI-enforced protection for CVE-2003-0908. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0213 |
CVE-2004-0207 | User can call certain API functions to modify certain properties of privileged programs. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0207 |
Relationship Overlaps privilege errors and UI errors. Research Gap
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Unprotected Windows Messaging Channel ('Shatter') | ||
Software Fault Patterns | SFP30 | Missing endpoint authentication |