Integer Overflow to Buffer Overflow |
Compound Element ID: 680 (Compound Element Base: Chain) | Status: Draft |
Description Summary
Nature | Type | ID | Name | View(s) this relationship pertains to![]() | Named Chain(s) this relationship pertains to![]() |
---|---|---|---|---|---|
StartsWith | ![]() | 190 | Integer Overflow or Wraparound | Named Chains709 | Integer Overflow to Buffer Overflow680 |
ChildOf | ![]() | 20 | Improper Input Validation | Research Concepts (primary)1000 |
CAPEC-ID | Attack Pattern Name | (CAPEC Version: 1.4) |
---|---|---|
8 | Buffer Overflow in an API Call | |
9 | Buffer Overflow in Local Command-Line Utilities | |
10 | Buffer Overflow via Environment Variables | |
14 | Client-side Injection-induced Buffer Overflow | |
24 | Filter Failure through Buffer Overflow | |
92 | Forced Integer Overflow | |
45 | Buffer Overflow via Symbolic Links | |
100 | Overflow Buffers | |
46 | Overflow Variables and Tags | |
47 | Buffer Overflow via Parameter Expansion | |
67 | String Format Overflow in syslog() |
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.