Divide By Zero

Draft Base
Structure: Simple
Description

The product divides a value by zero.

Extended Description

This weakness typically occurs when an unexpected value is provided to the product, or if an error occurs that is not properly detected. It frequently occurs in calculations involving physical dimensions such as size, length, width, and height.

Common Consequences 1
Scope: Availability

Impact: DoS: Crash, Exit, or Restart

A Divide by Zero results in a crash.

Detection Methods 2
Automated Static AnalysisHigh
Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)
FuzzingHigh
Fuzz testing (fuzzing) is a powerful technique for generating large numbers of diverse inputs - either randomly or algorithmically - and dynamically invoking the code with those inputs. Even with random inputs, it is often capable of generating unexpected results such as crashes, memory corruption, or resource consumption. Fuzzing effectively produces repeatable test cases that clearly indicate bugs, which helps developers to diagnose the issues.
Demonstrative Examples 3
The following Java example contains a function to compute an average but does not validate that the input value used as the denominator is not zero. This will create an exception for attempting to divide by zero. If this error is not handled by Java exception handling, unexpected results can occur.

Code Example:

Bad
Java
java
By validating the input value used as the denominator the following code will ensure that a divide by zero error will not cause unexpected results. The following Java code example will validate the input value, output an error message, and throw an exception.

Code Example:

Good
Java
java
The following C/C++ example contains a function that divides two numeric values without verifying that the input value used as the denominator is not zero. This will create an error for attempting to divide by zero, if this error is not caught by the error handling capabilities of the language, unexpected results can occur.

Code Example:

Bad
C
c
By validating the input value used as the denominator the following code will ensure that a divide by zero error will not cause unexpected results. If the method is called and a zero is passed as the second argument a DivideByZero error will be thrown and should be caught by the calling block with an output message indicating the error.

Code Example:

Good
C
c
The following C# example contains a function that divides two numeric values without verifying that the input value used as the denominator is not zero. This will create an error for attempting to divide by zero, if this error is not caught by the error handling capabilities of the language, unexpected results can occur.

Code Example:

Bad
C#
c#
The method can be modified to raise, catch and handle the DivideByZeroException if the input value used as the denominator is zero.

Code Example:

Good
C#
c#
Observed Examples 3
CVE-2007-3268Invalid size value leads to divide by zero.
CVE-2007-2723"Empty" content triggers divide by zero.
CVE-2007-2237Height value of 0 triggers divide by zero.
References 2
Handling Errors Exceptionally Well in C++
Alex Allain
ID: REF-371
Exceptions and Exception Handling (C# Programming Guide)
Microsoft
ID: REF-372
Likelihood of Exploit

Medium

Modes of Introduction
Implementation
Taxonomy Mapping
  • OWASP Top Ten 2004
  • CERT C Secure Coding
  • CERT C Secure Coding
  • The CERT Oracle Secure Coding Standard for Java (2011)
  • Software Fault Patterns