VYPR

CWE-69

Improper Handling of Windows ::DATA Alternate Data Stream

VariantIncomplete

Description

The product does not properly prevent access to, or detect usage of, alternate data streams (ADS).

An attacker can use an ADS to hide information about a file (e.g. size, the name of the process) from a system or file browser tools such as Windows Explorer and 'dir' at the command line utility. Alternately, the attacker might be able to bypass intended access restrictions for the associated data fork.

Hierarchy (View 1000)

Parents

Children

none

Related attack patterns (CAPEC)

CAPEC-168

CVEs mapped to this weakness (0)

No CVEs match the current filter.