CAPEC 44 Overflow Binary Resource File

Draft Detailed High Risk
Severity Very High

Description

An attack of this type exploits a buffer overflow vulnerability in the handling of binary resources. Binary resources may include music files like MP3, image files like JPEG files, and any other binary file. These attacks may pass unnoticed to the client machine through normal usage of files, such as a browser loading a seemingly innocent JPEG file. This can allow the adversary access to the execution stack and execute arbitrary code in the target process.

Attack Execution Flow

4

Mitigations

5

Consequences

Relationships