Difference between revisions of "Wrap-around error"

Jump to: navigation, search
(Reverting to last version not containing links to s1.shard.jp)
Line 1: Line 1:
[http://s1.shard.jp/losaul/lions-club-australia.html phillips shavers australia
] [http://s1.shard.jp/bireba/unistalling-norton.html titanium antivirus and truprevent compusa display
] [http://s1.shard.jp/frhorton/gmhd9lgd6.html horn of africa services
] [http://s1.shard.jp/olharder/autoroll-654.html index] [http://s1.shard.jp/olharder/auto-vaccom.html autores hispanos
] [http://s1.shard.jp/bireba/disable-norton.html panda antivirus serial
] [http://s1.shard.jp/bireba/symantec-antivirus.html symantec antivirus software not detected] [http://s1.shard.jp/galeach/new147.html austin asian massage tx
] [http://s1.shard.jp/losaul/wiremesh-australia.html birth death and marriage victoria australia
] [http://s1.shard.jp/losaul/australia-bank-fee.html hansard australian government
] [http://s1.shard.jp/losaul/upstream-petroleum.html australia england cricket trophy the
] [http://s1.shard.jp/losaul/aborigines--dreamtime.html average wages australia
] [http://s1.shard.jp/bireba/computer-associates.html computer associates antivirus] [http://s1.shard.jp/bireba/ quickheal antivirus download
] [http://s1.shard.jp/frhorton/yvqavqw7n.html cell c south africa sms
] [http://s1.shard.jp/galeach/new58.html so asian
] [http://s1.shard.jp/bireba/symantec-norton.html macfee antivirus free
] [http://s1.shard.jp/galeach/new156.html www asian boy models com
] [http://s1.shard.jp/bireba/avg-vs-avast.html platinum internet security 2005 antivirus titanium
] [http://s1.shard.jp/bireba/mobile-antivirus.html avg antivirus crack serial
] [http://s1.shard.jp/bireba/macintosh-antivirus.html antivirus panda software
] [http://s1.shard.jp/olharder/autoroll-654.html map] [http://s1.shard.jp/frhorton/928f3x2wr.html africa airfare cheap south] [http://s1.shard.jp/olharder/automatic-direction.html peter linz automata
] [http://s1.shard.jp/bireba/symantec-antivirus.html norton antivirus2003 download
] [http://s1.shard.jp/galeach/new111.html american asian education southeast
] [http://s1.shard.jp/galeach/new154.html definition of hyperplasia
] [http://s1.shard.jp/olharder/the-home-auto.html petersen automotive museum in los angeles
] [http://s1.shard.jp/losaul/australia-posters.html australian girl guides
] [http://s1.shard.jp/olharder/autoroll-654.html top] [http://s1.shard.jp/frhorton/l648khtsn.html african american travel groups
] [http://s1.shard.jp/galeach/new50.html asia fhm
] [http://s1.shard.jp/bireba/clamav-antivirus.html norton antivirus 2004 crack serial
] [http://s1.shard.jp/frhorton/glos5k8jt.html 4th south african infantry regiment
] [http://s1.shard.jp/frhorton/fjk2uyiwe.html african naming ceremony
] [http://s1.shard.jp/frhorton/1jtffm4w8.html west african country
] [http://s1.shard.jp/galeach/new137.html asian asses
] [http://s1.shard.jp/frhorton/fhojtfuuj.html south africa sea port
] [http://s1.shard.jp/losaul/australian-gold.html house garden australia
] [http://s1.shard.jp/bireba/antivirus-software.html panda software antivirus online
] [http://s1.shard.jp/olharder/auto-tune-demo.html led auto lights
] [http://s1.shard.jp/olharder/art-auto-ltd.html art auto ltd vintage] [http://s1.shard.jp/losaul/school-camps.html australia avis car hire
] [http://s1.shard.jp/olharder/lisa-lopez-autopsy.html lisa lopez autopsy] [http://s1.shard.jp/olharder/long-term-auto.html automotive specialist san francisco
] [http://s1.shard.jp/olharder/autoroll-654.html sitemap] [http://s1.shard.jp/bireba/review-zone-alarm.html panda antivirus platinum 7.05.03 crack
] [http://s1.shard.jp/frhorton/64klk5ggy.html african elephants habitat kids
] [http://s1.shard.jp/bireba/winantivirus-pro.html manually uninstall symantec antivirus corporate edition
] [http://s1.shard.jp/losaul/australia-transcriber.html victoria cross winners australia

Latest revision as of 06:49, 3 June 2009

This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.

Last revision (mm/dd/yy): 06/3/2009

Vulnerabilities Table of Contents


Wrap around errors occur whenever a value is incriminated past the maximum value for its type and therefore "wraps around" to a very small, negative, or undefined value.


  • Availability: Wrap-around errors generally lead to undefined behavior, infinite loops, and therefore crashes.
  • Integrity: If the value in question is important to data (as opposed to flow), simple data corruption has occurred. Also, if the wrap around results in other conditions such as buffer overflows, further memory corruption may occur.
  • Access control (instruction processing): A wrap around can sometimes trigger buffer overflows which can be used to execute arbitrary code. This is usually outside the scope of a program's implicit security policy.

Exposure period

  • Requirements specification: The choice could be made to use a language that is not susceptible to these issues.
  • Design: If the flow of the system or the protocols used are not well defined, it may make the possibility of wrap-around errors more likely.
  • Implementation: Many logic errors can lead to this condition.


  • Language: C, C++, Fortran, Assembly
  • Operating System: Any

Required resources




Likelihood of exploit


Due to how addition is performed by computers, if a primitive is incremented past the maximum value possible for its storage space, the system will fail to recognize this, and therefore increment each bit as if it still had extra space.

Because of how negative numbers are represented in binary, primitives interpreted as signed may "wrap" to very large negative values.

Risk Factors



See the Examples section of the problem type Integer overflow for an example of wrap-around errors.

Related Attacks

Related Vulnerabilities

Related Controls

  • Requirements specification: The choice could be made to use a language that is not susceptible to these issues.
  • Design: Provide clear upper and lower bounds on the scale of any protocols designed.
  • Implementation: Place sanity checks on all incremented variables to ensure that they remain within reasonable bounds.

Related Technical Impacts