If too few arguments are sent to a function, the function will still pop the expected number of arguments from the stack. Potentially, a variable number of arguments could be exhausted in a function as well.
N/A
Threat Mapped score: 0.0
Industry: Finiancial
Threat priority: Unclassified
CVE: CVE-2004-0276
Server earlier allows remote attackers to cause a denial of service (crash) via an HTTP request with a sequence of "%" characters and a missing Host field.
CVE: CVE-2002-1488
Chat client allows remote malicious IRC servers to cause a denial of service (crash) via a PART message with (1) a missing channel or (2) a channel that the user is not in.
CVE: CVE-2002-1169
Proxy allows remote attackers to cause a denial of service (crash) via an HTTP request to helpout.exe with a missing HTTP version numbers.
CVE: CVE-2000-0521
Web server allows disclosure of CGI source code via an HTTP request without the version number.
CVE: CVE-2001-0590
Application server allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification.
CVE: CVE-2003-0239
Chat software allows remote attackers to cause a denial of service via malformed GIF89a headers that do not contain a GCT (Global Color Table) or an LCT (Local Color Table) after an Image Descriptor.
CVE: CVE-2002-1023
Server allows remote attackers to cause a denial of service (crash) via an HTTP GET request without a URI.
CVE: CVE-2002-1236
CGI crashes when called without any arguments.
CVE: CVE-2003-0422
CGI crashes when called without any arguments.
CVE: CVE-2002-1531
Crash in HTTP request without a Content-Length field.
CVE: CVE-2002-1077
Crash in HTTP request without a Content-Length field.
CVE: CVE-2002-1358
Empty elements/strings in protocol test suite affect many SSH2 servers/clients.
CVE: CVE-2003-0477
FTP server crashes in PORT command without an argument.
CVE: CVE-2002-0107
Resultant infoleak in web server via GET requests without HTTP/1.0 version string.
CVE: CVE-2002-0596
GET request with empty parameter leads to error message infoleak (path disclosure).
N/A
N/A
Phase | Note |
---|---|
Implementation | N/A |
Intro: The following example demonstrates the weakness.
Body: This can be exploited to disclose information with no work whatsoever. In fact, each time this function is run, it will print out the next 4 bytes on the stack after the two numbers sent to it.
foo_funct(one, two); void foo_funct(int one, int two, int three) { printf("1) %d\n2) %d\n3) %d\n", one, two, three); }