Name |
Signature Spoofing by Misrepresentation |
|
Likelyhood of attack |
Typical severity |
Low |
High |
|
Summary |
An attacker exploits a weakness in the parsing or display code of the recipient software to generate a data blob containing a supposedly valid signature, but the signer's identity is falsely represented, which can lead to the attacker manipulating the recipient software or its victim user to perform compromising actions. |
Prerequisites |
Recipient is using signature verification software that does not clearly indicate potential homographs in the signer identity.Recipient is using signature verification software that contains a parsing vulnerability, or allows control characters in the signer identity field, such that a signature is mistakenly displayed as valid and from a known or authoritative signer. |
Solutions | Ensure the application is using parsing and data display techniques that will accurately display control characters, international symbols and markings, and ultimately recognize potential homograph attacks. |
Related Weaknesses |
CWE ID
|
Description
|
CWE-290 |
Authentication Bypass by Spoofing |
|
Related CAPECS |
CAPEC ID
|
Description
|
CAPEC-473 |
An attacker generates a message or datablock that causes the recipient to believe that the message or datablock was generated and cryptographically signed by an authoritative or reputable source, misleading a victim or victim operating system into performing malicious actions. |
|