The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
This can have security implications when the associated resource is expected to have certain properties or values, such as a variable that determines whether a user has been authenticated or not.
Threat Mapped score: 1.8
Industry: Finiancial
Threat priority: P4 - Informational (Low)
CVE: CVE-2001-1471
chain: an invalid value prevents a library file from being included, skipping initialization of key variables, leading to resultant eval injection.
CVE: CVE-2008-3637
Improper error checking in protection mechanism produces an uninitialized variable, allowing security bypass and code execution.
CVE: CVE-2008-4197
Use of uninitialized memory may allow code execution.
CVE: CVE-2008-2934
Free of an uninitialized pointer leads to crash and possible code execution.
CVE: CVE-2007-3749
OS kernel does not reset a port when starting a setuid program, allowing local users to access the port and gain privileges.
CVE: CVE-2008-0063
Product does not clear memory contents when generating an error message, leading to information leak.
CVE: CVE-2008-0062
Lack of initialization triggers NULL pointer dereference or double-free.
CVE: CVE-2008-0081
Uninitialized variable leads to code execution in popular desktop application.
CVE: CVE-2008-3688
chain: Uninitialized variable leads to infinite loop.
CVE: CVE-2008-3475
chain: Improper initialization leads to memory corruption.
CVE: CVE-2008-5021
Composite: race condition allows attacker to modify an object while it is still being initialized, causing software to access uninitialized memory.
CVE: CVE-2005-1036
Chain: Bypass of access restrictions due to improper authorization (CWE-862) of a user results from an improperly initialized (CWE-909) I/O permission bitmap
CVE: CVE-2008-3597
chain: game server can access player data structures before initialization has happened leading to NULL dereference
CVE: CVE-2009-2692
chain: uninitialized function pointers can be dereferenced allowing code execution
CVE: CVE-2009-0949
chain: improper initialization of memory can lead to NULL dereference
CVE: CVE-2009-3620
chain: some unprivileged ioctls do not verify that a structure has been initialized before invocation, leading to NULL dereference
N/A
Phase | Note |
---|---|
Implementation | This weakness can occur in code paths that are not well-tested, such as rare error conditions. This is because the use of uninitialized data would be noticed as a bug during frequently-used functionality. |
Operation | N/A |
Intro: Here, a boolean initiailized field is consulted to ensure that initialization tasks are only completed once. However, the field is mistakenly set to true during static initialization, so the initialization code is never reached.
private boolean initialized = true; public void someMethod() { if (!initialized) { // perform initialization tasks ... initialized = true; }
Intro: The following code intends to limit certain operations to the administrator only.
Body: If the application is unable to extract the state information - say, due to a database timeout - then the $uid variable will not be explicitly set by the programmer. This will cause $uid to be regarded as equivalent to "0" in the conditional, allowing the original user to perform administrator actions. Even if the attacker cannot directly influence the state data, unexpected errors could cause incorrect privileges to be assigned to a user just by accident.
$username = GetCurrentUser(); $state = GetStateData($username); if (defined($state)) { $uid = ExtractUserID($state); } # do stuff if ($uid == 0) { DoAdminThings(); }
Intro: The following code intends to concatenate a string to a variable and print the string.
Body: This might seem innocent enough, but str was not initialized, so it contains random memory. As a result, str[0] might not contain the null terminator, so the copy might start at an offset other than 0. The consequences can vary, depending on the underlying memory.
char str[20]; strcat(str, "hello world"); printf("%s", str);