This attack pattern involves an adversary manipulating a pointer within a target application resulting in the application accessing an unintended memory location. This can result in the crashing of the application or, for certain pointer values, access to data that would not normally be possible or the execution of arbitrary code. Since pointers are simply integer variables, Integer Attacks may often be used in Pointer Attacks.
|
|
| ID | CAPEC-129 |
| Latest Sync Date | 11/05/25 15:15:38 |
| Original ID | 129 |
| Abstraction | Meta |
| Status | Draft |
| Alternate Terms | |
| Likelihood Of Attack | |
| Typical Severity | Medium |
| Related Attack Patterns | |
| Execution Flow | |
| Prerequisites | ::The target application must have a pointer variable that the attacker can influence to hold an arbitrary value.:: |
| Skills Required | |
| Resources Required | ::None: No specialized resources are required to execute this type of attack.:: |
| Indicators | |
| Consequences | |
| Mitigations | |
| Example Instances | |
| Related Weaknesses | ::682::822::823:: |
| Taxonomy Mappings | |
| Notes | |