CAPEC 52 Embedding NULL Bytes

Draft Detailed High Risk
Severity High

Description

An adversary embeds one or more null bytes in input to the target software. This attack relies on the usage of a null-valued byte as a string terminator in many environments. The goal is for certain components of the target software to stop processing the input when it encounters the null byte(s).

Attack Execution Flow

3

Mitigations

1

Consequences

Relationships