CWE一覧に戻る
CWE-682

誤った計算

Incorrect Calculation
脆弱性 レビュー中
JA

この製品が計算を実行すると、不正確な結果や意図しない結果が生成され、後にセキュリティ上重要な意思決定やリソース管理に使用される。

製品がセキュリティ上重要な計算を不正に実行すると、不正なリソースの割り当て、不正な特権の割り当て、比較の失敗などにつながる可能性があります。不正確な計算の直接的な結果の多くは、保護メカニズムの失敗、あるいは、任意のコードの実行のような、さらに大きな問題につながる可能性があります。

EN

The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.

When product performs a security-critical calculation incorrectly, it might lead to incorrect resource allocations, incorrect privilege assignments, or failed comparisons among other things. Many of the direct results of an incorrect calculation can lead to even larger problems such as failed protection mechanisms or even arbitrary code execution.

Scope: Availability / Impact: DoS: Crash, Exit, or Restart
Scope: Integrity, Confidentiality, Availability / Impact: DoS: Crash, Exit, or Restart; DoS: Resource Consumption (Other); Execute Unauthorized Code or Commands
Scope: Access Control / Impact: Gain Privileges or Assume Identity
Scope: Access Control / Impact: Bypass Protection Mechanism
Understand your programming language's underlying representation and how it interacts with numeric calculation. Pay close attention to byte size discrepancies, precision, signed/unsigned distinctions, truncation, conversion and casting between types, "not-a-number" calculations, and how your language handles numbers that are too large or too small for its underlying representation.
Perform input validation on any numeric input by ensuring that it is within the expected range. Enforce that the input meets both the minimum and maximum requirements for the expected range.
Use the appropriate type for the desired action. For example, in C/C++, only use unsigned types for values that could never be negative, such as height, width, or other numbers related to quantity.
Use languages, libraries, or frameworks that make it easier to handle numbers without unexpected consequences.

Examples include safe integer handling packages such as SafeInt (C++) or IntegerLib (C or C++).
Use languages, libraries, or frameworks that make it easier to handle numbers without unexpected consequences.

Examples include safe integer handling packages such as SafeInt (C++) or IntegerLib (C or C++).
Examine compiler warnings closely and eliminate problems with potential security implications, such as signed / unsigned mismatch in memory operations, or use of uninitialized variables. Even if the weakness is rarely exploitable, a single failure may lead to the compromise of the entire system.
Use automated static analysis tools that target this type of weakness. Many modern techniques use data flow analysis to minimize the number of false positives. This is not a perfect solution, since 100% accuracy and coverage are not feasible.
Use dynamic tools and techniques that interact with the product using large test suites with many diverse inputs, such as fuzz testing (fuzzing), robustness testing, and fault injection. The product's operation may slow down, but it should not become unstable, crash, or generate incorrect results.
MITRE公式ページ — CWE-682