Inter-protocol communication
From Wikipedia, the free encyclopedia
Inter-protocol communication[1] is a security vulnerability in the fundamentals of a network communication protocol. Whilst other protocols are vulnerable, this vulnerability is commonly discussed in the context of the Hypertext Transfer Protocol (HTTP) [2]. This attack uses the potential of the two different protocols meaningfully communicating commands and data.
Inter-protocol Exploitation can utilize Inter-protocol communication to establish the preconditions for launching an Inter-protocol exploit. For example, this process could negotiate the initial authentication communication for a vulnerability in password parsing.
Contents |
[edit] Technical Details
The two protocols involved in the vulnerability are termed the carrier and target. The carrier encapsulates the commands and/or data. The target protocol is used for communication to the intended victim service. Inter-protocol communication will be successful if the carrier protocol can encapsulate the commands and/or data sufficiently to meaningfully communicate to the target service.
[edit] Preconditions
Two preconditions need to be met for successful communication across protocols: encapsulation and error tolerance.
[edit] Encapsulation
The carrier protocol must encapsulate the data and commands in a manner that the target protocol can understand. It is highly likely that the resulting data stream with induce parsing errors in the target protocol.
[edit] Error Tolerance
The target protocol be must be sufficiently forgiving of errors. During the Inter-Protocol connection it is likely that a percentage of the communication will be invalid and cause errors. To meet this precondition, the target protocol implementation must continue processing despite these errors.
[edit] References
- ^ Inter-protocol Communication (2006-08).
- ^ HTML Form Protocol Attack.