Use of Incorrect Byte Ordering |
Weakness ID: 198 (Weakness Base) | Status: Draft |
Description Summary
Black Box Because byte ordering bugs are usually very noticeable even with normal inputs, this bug is more likely to occur in rarely triggered error conditions, making them difficult to detect using black box methods. |
Nature | Type | ID | Name | View(s) this relationship pertains to |
---|---|---|---|---|
ChildOf | Weakness Base | 188 | Reliance on Data/Memory Layout | Research Concepts (primary)1000 |
ChildOf | Category | 189 | Numeric Errors | Development Concepts (primary)699 |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Detection Factors, Relationships, Research Gaps, Taxonomy Mappings | ||||
2009-05-27 | CWE Content Team | MITRE | Internal | |
updated Description | ||||
Previous Entry Names | ||||
Change Date | Previous Entry Name | |||
2008-04-11 | Numeric Byte Ordering Error | |||
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.
28 June 2016