Non-Replicating Malicious Code

Incomplete Base
Structure: Simple
Description

Non-replicating malicious code only resides on the target system or product that is attacked; it does not attempt to spread to other systems.

Common Consequences 1
Scope: ConfidentialityIntegrityAvailability

Impact: Execute Unauthorized Code or Commands

Potential Mitigations 2
Phase: Operation
Antivirus software can help mitigate known malicious code.
Phase: Installation
Verify the integrity of the software that is being installed.
References 1
A Taxonomy of Computer Program Security Flaws, with Examples
Carl E. Landwehr, Alan R. Bull, John P. McDermott, and William S. Choi
19-11-1993
ID: REF-1431
Modes of Introduction
Implementation
Operation
Related Weaknesses
Taxonomy Mapping
  • Landwehr