CAPEC 477 Signature Spoofing by Mixing Signed and Unsigned Content

Draft Detailed Low Risk
Severity High

Description

An attacker exploits the underlying complexity of a data structure that allows for both signed and unsigned content, to cause unsigned data to be processed as though it were signed data.

Mitigations

1

Consequences

Relationships