The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.
When product performs a security-critical calculation incorrectly, it might lead to incorrect resource allocations, incorrect privilege assignments, or failed comparisons among other things. Many of the direct results of an incorrect calculation can lead to even larger problems such as failed protection mechanisms or even arbitrary code execution.
Impact: DoS: Crash, Exit, or Restart
If the incorrect calculation causes the program to move into an unexpected state, it may lead to a crash or impairment of service.
Impact: DoS: Crash, Exit, or RestartDoS: Resource Consumption (Other)Execute Unauthorized Code or Commands
If the incorrect calculation is used in the context of resource allocation, it could lead to an out-of-bounds operation (Improper Restriction of Operations within the Bounds of a Memory Buffer) leading to a crash or even arbitrary code execution. Alternatively, it may result in an integer overflow (Integer Overflow or Wraparound) and / or a resource consumption problem (Uncontrolled Resource Consumption).
Impact: Gain Privileges or Assume Identity
In the context of privilege or permissions assignment, an incorrect calculation can provide an attacker with access to sensitive resources.
Impact: Bypass Protection Mechanism
If the incorrect calculation leads to an insufficient comparison (Incorrect Comparison), it may compromise a protection mechanism such as a validation routine and allow an attacker to bypass the security-critical code.
Strategy: Input Validation
Strategy: Language Selection
Strategy: Libraries or Frameworks
Strategy: Compilation or Build Hardening
cjavacHigh