Read Time:18 Second

Description

The software receives input from an upstream component, but it does not account for byte ordering (e.g. big-endian and little-endian) when processing the input, causing an incorrect number or value to be used.

Modes of Introduction:

– Architecture and Design

 

 

Related Weaknesses

CWE-188

 

Consequences

Integrity: Unexpected State

 

Potential Mitigations

CVE References