Embedded Malicious Code |
Weakness ID: 506 (Weakness Class) | Status: Incomplete |
Description Summary
Extended Description
Malicious flaws have acquired colorful names, including Trojan horse, trapdoor, timebomb, and logic-bomb. A developer might insert malicious code with the intent to subvert the security of an application or its host system at some time in the future. It generally refers to a program that performs a useful service but exploits rights of the program's user in a way the user does not intend.
Example 1
In the example below, a malicous developer has injected code to send credit card numbers to his email address.
Remove the malicious code and start an effort to ensure that no more malicious code exists. This may require a detailed review of all code, as it is possible to hide a serious attack in only one or two lines of code. These lines may be located almost anywhere in an application and may have been intentionally obfuscated by the attacker. |
The term "Trojan horse" was introduced by Dan Edwards and recorded by James Anderson [18] to characterize a particular computer security threat; it has been redefined many times [4,18-20]. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 505 | Intentionally Introduced Weakness | Development Concepts (primary)699 |
ChildOf | ![]() | 710 | Coding Standards Violation | Research Concepts (primary)1000 |
ParentOf | ![]() | 507 | Trojan Horse | Development Concepts (primary)699 Research Concepts (primary)1000 |
ParentOf | ![]() | 510 | Trapdoor | Development Concepts (primary)699 Research Concepts (primary)1000 |
ParentOf | ![]() | 511 | Logic/Time Bomb | Development Concepts (primary)699 Research Concepts (primary)1000 |
ParentOf | ![]() | 512 | Spyware | Development Concepts (primary)699 Research Concepts (primary)1000 |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
Landwehr | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Sean Eidemiller | Cigital | External | |
added/updated demonstrative examples | ||||
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Description, Relationships, Other Notes, Taxonomy Mappings | ||||
2009-10-29 | CWE Content Team | MITRE | Internal | |
updated Description, Other Notes | ||||
Previous Entry Names | ||||
Change Date | Previous Entry Name | |||
2008-01-30 | Malicious | |||