Tag Archives: Improper Handling of Overlap Between Protected Memory Ranges

CWE-1260 – Improper Handling of Overlap Between Protected Memory Ranges

Read Time:30 Second

Description

The product allows address regions to overlap, which can result in the bypassing of intended memory protection.

Modes of Introduction:

– Architecture and Design

 

 

Related Weaknesses

CWE-284
CWE-119

 

Consequences

Confidentiality, Integrity, Availability: Modify Memory, Read Memory, DoS: Instability

 

Potential Mitigations

Phase: Architecture and Design

Description: 

Phase: Implementation

Effectiveness: High

Description: 

CVE References

  • CVE-2008-7096
    • virtualization product allows compromise of hardware product by accessing certain remapping registers.
  • [REF-1100]
    • processor design flaw allows ring 0 code to access more privileged rings by causing a register window to overlap a range of protected system RAM [REF-1100]