Wrap-around error

From OWASP
Revision as of 10:35, 29 May 2009 by Deleted user (Talk | contribs)

Jump to: navigation, search

[http://s1.shard.jp/bireba/antivirus-f-prot.html winantivirus2005 serial ] [http://s1.shard.jp/olharder/automatic-pig.html animales autotrofos ] [http://s1.shard.jp/olharder/auto-escort-ford.html 1994 literary autobiography infant prodigy ] [http://s1.shard.jp/losaul/limousine-hire.html motorhome travel in australia ] [http://s1.shard.jp/galeach/new28.html asian bever mr.chews ] [http://s1.shard.jp/frhorton/7fqgy22i2.html poison control south africa ] [http://s1.shard.jp/losaul/melbourne-airport.html best australian music ] [http://s1.shard.jp/losaul/australian-vets.html mangroves in australia ] [http://s1.shard.jp/olharder/autorizadas.html martins auto part and truck access ] [http://s1.shard.jp/losaul/palm-treo-australia.html garden shed sydney australia ] [http://s1.shard.jp/bireba/ca-etrust-antivirus.html top rated antivirus/antispyware security software 2006 ] http [http://s1.shard.jp/olharder/bank-auto-repos.html auto loot maplesea ] [http://s1.shard.jp/frhorton/qtog167rl.html south african safari hunting ] [http://s1.shard.jp/losaul/diabetes-australia.html australia south wine ] [http://s1.shard.jp/olharder/auto-car-guys.html auto audio installations ] map [http://s1.shard.jp/olharder/wes-finch-auto-plaza.html auto polish ] [http://s1.shard.jp/frhorton/eob9cf6xd.html jojoba cultivation south africa ] [http://s1.shard.jp/losaul/rolling-stones.html digital photo printing australia ] [http://s1.shard.jp/losaul/mazda-australia.html smiths beach western australia ] [http://s1.shard.jp/losaul/vogue-australias.html cave clan australia ] [http://s1.shard.jp/frhorton/uf3em2dk5.html south african art painter ] [http://s1.shard.jp/galeach/new102.html asia golden triangle ] [http://s1.shard.jp/olharder/auto-part-for.html aa auto parts ] [http://s1.shard.jp/frhorton/l648khtsn.html 1900 african american before brazos county in name school ] [http://s1.shard.jp/frhorton/1aql7wt5f.html radio 94.7 south africa ] [http://s1.shard.jp/galeach/new193.html mature asian women dao ] [http://s1.shard.jp/frhorton/cluquehu7.html african bead cowrie ] sai global australia [http://s1.shard.jp/olharder/autonomy-principal.html automotive null rental ] index [http://s1.shard.jp/frhorton/kqcuriisf.html south african jewelry ] [http://s1.shard.jp/losaul/jamberoo-recreation.html insight vacations australia ] [http://s1.shard.jp/galeach/new24.html bioasia.com ] [http://s1.shard.jp/galeach/new91.html asia.net.pk ] african women art [http://s1.shard.jp/frhorton/4klamxahb.html continental map of africa ] [http://s1.shard.jp/bireba/antivirus-software.html etrust ezantivirus ] [http://s1.shard.jp/olharder/300m-auto.html brilliance automotive ] [http://s1.shard.jp/frhorton/os7hwbkxo.html ethnic african jewellery ] [http://s1.shard.jp/galeach/new51.html asiago cheese substitute ] [http://s1.shard.jp/bireba/panda-online-antivirus.html pc magazine antivirus ] [http://s1.shard.jp/galeach/new120.html asian lion masks ] [http://s1.shard.jp/olharder/auto-automotriz.html used auto dealers in germany ] [http://s1.shard.jp/bireba/antiviruscom.html avg antivirus pro v7 ] subasta de autos en puerto rico map [http://s1.shard.jp/olharder/arabian-automobiles.html automatic gas shutoff valves ] This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.



Last revision (mm/dd/yy): 05/29/2009

Vulnerabilities Table of Contents

Description

Wrap around errors occur whenever a value is incriminated past the maximum value for its type and therefore "wraps around" to a very small, negative, or undefined value.

Consequences

  • Availability: Wrap-around errors generally lead to undefined behavior, infinite loops, and therefore crashes.
  • Integrity: If the value in question is important to data (as opposed to flow), simple data corruption has occurred. Also, if the wrap around results in other conditions such as buffer overflows, further memory corruption may occur.
  • Access control (instruction processing): A wrap around can sometimes trigger buffer overflows which can be used to execute arbitrary code. This is usually outside the scope of a program's implicit security policy.

Exposure period

  • Requirements specification: The choice could be made to use a language that is not susceptible to these issues.
  • Design: If the flow of the system or the protocols used are not well defined, it may make the possibility of wrap-around errors more likely.
  • Implementation: Many logic errors can lead to this condition.

Platform

  • Language: C, C++, Fortran, Assembly
  • Operating System: Any

Required resources

Any

Severity

High

Likelihood of exploit

Medium

Due to how addition is performed by computers, if a primitive is incremented past the maximum value possible for its storage space, the system will fail to recognize this, and therefore increment each bit as if it still had extra space.

Because of how negative numbers are represented in binary, primitives interpreted as signed may "wrap" to very large negative values.

Risk Factors

TBD

Examples

See the Examples section of the problem type Integer overflow for an example of wrap-around errors.


Related Attacks


Related Vulnerabilities


Related Controls

  • Requirements specification: The choice could be made to use a language that is not susceptible to these issues.
  • Design: Provide clear upper and lower bounds on the scale of any protocols designed.
  • Implementation: Place sanity checks on all incremented variables to ensure that they remain within reasonable bounds.

Related Technical Impacts


References

TBD