CAPEC 10 Buffer Overflow via Environment Variables

Draft Detailed High Risk
Severity High

Description

This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the adversary finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.

Attack Execution Flow

4

Mitigations

4

Consequences

Indicators

1

Relationships