CAPEC 46 Overflow Variables and Tags

Draft Detailed High Risk
Severity High

Description

This type of attack leverages the use of tags or variables from a formatted configuration data to cause buffer overflow. The adversary crafts a malicious HTML page or configuration file that includes oversized strings, thus causing an overflow.

Attack Execution Flow

4

Mitigations

5

Consequences

Relationships