Replicating Malicious Code (Virus or Worm)

Incomplete Base
Structure: Simple
Description

Replicating malicious code, including viruses and worms, will attempt to attack other systems once it has successfully compromised the target system or the product.

Common Consequences 1
Scope: ConfidentialityIntegrityAvailability

Impact: Execute Unauthorized Code or Commands

Potential Mitigations 2
Phase: Operation
Antivirus software scans for viruses or worms.
Phase: Installation
Always verify the integrity of the software that is being installed.
References 1
A Taxonomy of Computer Program Security Flaws, with Examples
Carl E. Landwehr, Alan R. Bull, John P. McDermott, and William S. Choi
19-11-1993
ID: REF-1431
Modes of Introduction
Implementation
Operation
Related Weaknesses
Taxonomy Mapping
  • Landwehr