CAPEC-129: Pointer Manipulation |
Description This attack pattern involves an adversary manipulating a pointer within a target application resulting in the application accessing an unintended memory location. This can result in the crashing of the application or, for certain pointer values, access to data that would not normally be possible or the execution of arbitrary code. Since pointers are simply integer variables, Integer Attacks may often be used in Pointer Attacks. Typical Severity Relationships This table shows the views that this attack pattern belongs to and top level categories within that view. Prerequisites
| The target application must have a pointer variable that the attacker can influence to hold an arbitrary value. |
Resources Required
| None: No specialized resources are required to execute this type of attack. |
Content History | Submissions |
|---|
| Submission Date | Submitter | Organization |
|---|
| 2014-06-23 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | | | Modifications |
|---|
| Modification Date | Modifier | Organization |
|---|
| 2017-01-09 (Version 2.9) | CAPEC Content Team | The MITRE Corporation | | Updated Description Summary, Related_Attack_Patterns | | 2017-08-04 (Version 2.11) | CAPEC Content Team | The MITRE Corporation | | Updated Resources_Required | | 2019-04-04 (Version 3.1) | CAPEC Content Team | The MITRE Corporation | | Updated Related_Weaknesses | | Previous Entry Names |
|---|
| Change Date | Previous Entry Name |
|---|
| 2017-01-09 (Version 2.9) | Pointer Attack | |
More information is available — Please select a different filter.
|