Obscured Security-relevant Information by Alternate Name
Weakness ID: 224 (Weakness Base)Status: Incomplete
+ Description

Description Summary

The software records security-relevant information according to an alternate name of the affected entity, instead of the canonical name.
+ Time of Introduction
  • Architecture and Design
  • Implementation
  • Operation
+ Applicable Platforms



+ Observed Examples
CVE-2002-0725Attacker performs malicious actions on a hard link to a file, obscuring the real target file.
+ Potential Mitigations

Avoid making decisions based on names of resources if those resources can have alternate names.

+ Relationships
NatureTypeIDNameView(s) this relationship pertains toView(s)
ChildOfWeakness ClassWeakness Class221Information Loss or Omission
Development Concepts (primary)699
Research Concepts (primary)1000
+ Taxonomy Mappings
Mapped Taxonomy NameNode IDFitMapped Node Name
PLOVERObscured Security-relevant Information by Alternate Name
+ References
M. Howard and D. LeBlanc. "Writing Secure Code". 2nd Edition. Microsoft. 2003.
+ Content History
Submission DateSubmitterOrganizationSource
PLOVERExternally Mined
Modification DateModifierOrganizationSource
2008-07-01Eric DalciCigitalExternal
updated Time of Introduction
2008-09-08CWE Content TeamMITREInternal
updated Relationships, Taxonomy Mappings