An application typically makes calls to functions that are a part of libraries external to the application. These libraries may be part of the operating system or they may be third party libraries. It is possible that the application does not handle situations properly where access to these libraries has been blocked. Depending on the error handling within the application, blocked access to libraries may leave the system in an insecure state that could be leveraged by an attacker.
Description
Attack Execution Flow
Step 1
ExploreDetermine what external libraries the application accesses.
Determina quali librerie esterne l'applicazione utilizza.
Step 2
ExperimentBlock access to the external libraries accessed by the application.
Blocca l'accesso alle librerie esterne utilizzate dall'applicazione.
Step 3
ExperimentMonitor the behavior of the system to see if it goes into an insecure/inconsistent state.
Monitorare il comportamento del sistema per verificare se entra in uno stato insicuro/incoerente.
Step 4
ExperimentIf the system does go into an insecure/inconsistent state, leverage that to obtain information about the system functionality or data, elevate access control, etc. The rest of this attack will depend on the context and the desired goal.
Se il sistema dovesse entrare in uno stato insicuro/incoerente, sfruttalo per ottenere informazioni sulla funzionalità del sistema o sui dati, elevare i privilegi di accesso, ecc. Il resto di questo attacco dipenderà dal contesto e dall'obiettivo desiderato.