A write-what-where condition occurs when an attacker can control both the data written and the exact memory location where it's written, often due to a severe memory corruption flaw like a buffer overflow.
This vulnerability is one of the most dangerous memory corruption issues. It gives an attacker near-total control over a program's execution by allowing them to overwrite critical data or code pointers in memory. Think of it as an attacker having a precise remote control to edit the program's own instruction manual while it's running, which can directly lead to arbitrary code execution. For developers, this highlights the critical importance of secure memory management. Preventing this condition requires rigorous bounds checking, using safe functions that limit write lengths, and employing modern security features like address space layout randomization (ASLR) and stack canaries. It's often the final, exploitable result of simpler bugs like buffer overflows, making those initial flaws far more severe.
Impact: Modify MemoryExecute Unauthorized Code or CommandsGain Privileges or Assume IdentityDoS: Crash, Exit, or RestartBypass Protection Mechanism
Clearly, write-what-where conditions can be used to write data to areas of memory outside the scope of a policy. Also, they almost invariably can be used to execute arbitrary code, which is usually outside the scope of a program's implicit security policy. If the attacker can overwrite a pointer's worth of memory (usually 32 or 64 bits), they can redirect a function pointer to their own malicious code. Even when the attacker can only modify a single byte arbitrary code execution can be possible. Sometimes this is because the same problem can be exploited repeatedly to the same effect. Other times it is because the attacker can overwrite security-critical application-specific data -- such as a flag indicating whether the user is an administrator.
Impact: DoS: Crash, Exit, or RestartModify Memory
Many memory accesses can lead to program termination, such as when writing to addresses that are invalid for the current process.
Impact: Bypass Protection MechanismOther
When the consequence is arbitrary code execution, this can often be used to subvert any other security service.
Strategy: Language Selection
cHigh