Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-421:Race Condition During Access to Alternate Channel
Weakness ID:421
Version:v4.17
Weakness Name:Race Condition During Access to Alternate Channel
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Draft
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The product opens an alternate channel to communicate with an authorized user, but the channel is accessible to other actors.

▼Extended Description

This creates a race condition that allows an attacker to access the channel before the authorized user does.

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
ChildOfAllowedB420Unprotected Alternate Channel
ChildOfAllowed-with-ReviewC362Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Nature: ChildOf
Mapping: Allowed
Type: Base
ID: 420
Name: Unprotected Alternate Channel
Nature: ChildOf
Mapping: Allowed-with-Review
Type: Class
ID: 362
Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC557Concurrency Issues
MemberOfProhibitedC956SFP Secondary Cluster: Channel Attack
MemberOfProhibitedC1396Comprehensive Categorization: Access Control
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 557
Name: Concurrency Issues
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 956
Name: SFP Secondary Cluster: Channel Attack
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1396
Name: Comprehensive Categorization: Access Control
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-294Not Language-Specific Weaknesses
MemberOfProhibitedBSBOSS-316Bypass Protection Mechanism (impact)
MemberOfProhibitedBSBOSS-332Gain Privileges or Assume Identity (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-294
Name: Not Language-Specific Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-316
Name: Bypass Protection Mechanism (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-332
Name: Gain Privileges or Assume Identity (impact)
▼Relevant To View
Relevant to the view"Software Development - (699)"
NatureMappingTypeIDName
MemberOfProhibitedC557Concurrency Issues
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 557
Name: Concurrency Issues
Relevant to the view"Software Fault Pattern (SFP) Clusters - (888)"
NatureMappingTypeIDName
MemberOfProhibitedC956SFP Secondary Cluster: Channel Attack
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 956
Name: SFP Secondary Cluster: Channel Attack
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
Access ControlN/AGain Privileges or Assume IdentityBypass Protection Mechanism
N/A
Scope: Access Control
Likelihood: N/A
Impact: Gain Privileges or Assume Identity, Bypass Protection Mechanism
Note:
N/A
▼Potential Mitigations
▼Modes Of Introduction
Phase: Architecture and Design
Note:

N/A

▼Applicable Platforms
Languages
Class: Not Language-Specific(Undetermined Prevalence)
▼Demonstrative Examples
▼Observed Examples
ReferenceDescription
CVE-1999-0351
FTP "Pizza Thief" vulnerability. Attacker can connect to a port that was intended for use by another client.
CVE-2003-0230
Product creates Windows named pipe during authentication that another attacker can hijack by connecting to it.
Reference: CVE-1999-0351
Description:
FTP "Pizza Thief" vulnerability. Attacker can connect to a port that was intended for use by another client.
Reference: CVE-2003-0230
Description:
Product creates Windows named pipe during authentication that another attacker can hijack by connecting to it.
▼Affected Resources
  • System Process
▼Functional Areas
    ▼Weakness Ordinalities
    OrdinalityDescription
    ▼Detection Methods
    ▼Vulnerability Mapping Notes
    Usage:Allowed
    Reason:Acceptable-Use
    Rationale:

    This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

    Comments:

    Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

    Suggestions:
    ▼Notes
    ▼Taxonomy Mappings
    Taxonomy NameEntry IDFitEntry Name
    PLOVERN/AN/AAlternate Channel Race Condition
    Taxonomy Name: PLOVER
    Entry ID: N/A
    Fit: N/A
    Entry Name: Alternate Channel Race Condition
    ▼Related Attack Patterns
    IDName
    ▼References
    Reference ID: REF-354
    Title: Discovering and Exploiting Named Pipe Security Flaws for Fun and Profit
    Author: Blake Watts
    Section:
    Publication:
    Publisher:
    Edition:
    URL:https://www.blakewatts.com/blog/discovering-and-exploiting-named-pipe-security-flaws-for-fun-and-profit
    URL Date:2023-04-07
    Day:N/A
    Month:04
    Year:2002
    Reference ID: REF-44
    Title: 24 Deadly Sins of Software Security
    Author: Michael Howard, David LeBlanc, John Viega
    Section: "Sin 13: Race Conditions." Page 205
    Publication:
    McGraw-Hill
    Publisher:
    Edition:
    URL:
    URL Date:
    Day:N/A
    Month:N/A
    Year:2010
    Details not found