Failure to Handle Windows ::DATA Alternate Data Stream |
Weakness ID: 69 (Weakness Variant) | Status: Incomplete |
Description Summary
Extended Description
An attacker can use an ADS to hide information about a file (e.g. size, the name of the process) from a system or file browser tools such as Windows Explorer and 'dir' at the command line utility. Alternately, the attacker might be able to bypass intended access restrictions for the associated data fork.
Reference | Description |
---|---|
CVE-1999-0278 | |
CVE-2000-0927 |
Software tools are capable of finding ADSs on your system. |
Ensure that the source code correctly parses the filename to read or write to the correct stream. |
Alternate data streams (ADS) were first implemented in the Windows NT operating system to provide compatibility between NTFS and the Macintosh Hierarchical File System (HFS). In HFS, data and resource forks are used to store information about a file. The data fork provides information about the contents of the file while the resource fork stores metadata such as file type. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 66 | Improper Handling of File Names that Identify Virtual Resources | Development Concepts (primary)699 Research Concepts (primary)1000 |
ChildOf | ![]() | 68 | Windows Virtual File Problems | Resource-specific Weaknesses631 Development Concepts699 |
ChildOf | ![]() | 634 | Weaknesses that Affect System Processes | Resource-specific Weaknesses (primary)631 |
This and similar problems exist because the same resource can have multiple identifiers that dictate which behavior can be performed on the resource. |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Windows ::DATA alternate data stream |
CAPEC-ID | Attack Pattern Name | (CAPEC Version: 1.4) |
---|---|---|
11 | Cause Web Server Misclassification |
Don Parker. "Windows NTFS Alternate Data Streams". 2005-02-16. <http://www.securityfocus.com/infocus/1822>. |
M. Howard and D. LeBlanc. "Writing Secure Code". 2nd Edition. Microsoft. 2003. |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Applicable Platforms, Background Details, Description, Relationships, Other Notes, References, Taxonomy Mappings | ||||
2008-10-14 | CWE Content Team | MITRE | Internal | |
updated Description | ||||
2009-10-29 | CWE Content Team | MITRE | Internal | |
updated Other Notes, Theoretical Notes | ||||
Previous Entry Names | ||||
Change Date | Previous Entry Name | |||
2008-04-11 | Windows ::DATA Alternate Data Stream | |||