The product does not properly prevent access to, or detect usage of, alternate data streams (ADS).
Extended Description
An attacker can use an ADS to hide information about a file (e.g. size, the name of the process) from a system or file browser tools such as Windows Explorer and 'dir' at the command line utility. Alternately, the attacker might be able to bypass intended access restrictions for the associated data fork.
Impact: Bypass Protection Mechanism, Hide Activities, Other — Notes:
Potential Mitigations
Testing: Software tools are capable of finding ADSs on your system. (N/A)
Implementation: Ensure that the source code correctly parses the filename to read or write to the correct stream. (N/A)
Applicable Platforms
None (Not Language-Specific, Undetermined)
Demonstrative Examples
N/A
Notes
Theoretical: This and similar problems exist because the same resource can have multiple identifiers that dictate which behavior can be performed on the resource.