URI: MP-HP-iT
Package: Network
< prev | next >
Description: Finds a non-trivial Process and its Host, and optionally the host manager and the interactive user of the process.
Root Pattern: R-HP
Finds a Process and its Host.
(empty)
Effect of overload at process Process on Host: if the process Process is overloaded, it may cause an overload on its host Host.
Use of privileges at Process to control availability: anyone with local user rights (i.e. local control) of a process Process can shut it down. However, this does not prevent access where there are other instances of Process running on independent instances of Host.
Software bug crashes Process: a software bug in process Process causes it to crash, compromising availability.
Effect of overload at low priority process Process: the priority of process Process may be reduced to prevent it from overloading its host Host, but in that case Process may become unavailable even if Host is not.
Software bug overloads Process: a software bug in process Process causes it to become overlaoded.
Software bug causes Process to become unreliable: a software bug in process Process causes it to become unreliable.
Process Process infected via its host: device Host having been infected with malware, the software installed on the host for running process Process may also become infected.
Attacker exploit disables Process: the attacker exploits a vulnerability in the process Process and is able to crash it or otherwise prevent access to it.
Vulnerability (A) discovered at Process: software vulnerability found in process Process, which could allow an attack on process availability, and may be known to attackers. Only around 4 percent of vulnerabilities are specific to this type of action (NVD 2015-2019).
Vulnerability (AU) discovered at Process: software vulnerability found in process Process, which could allow an attack bypassing authentication, and may be known to attackers. Around 82 percent of vulnerabilities can be accessed without authentication (NVD 2015-2019).
Vulnerability (C) discovered at Process: software vulnerability found in process Process, which could allow an attack on data confidentiality, and may be known to attackers. Less than 1 percent of vulnerabilities are specific to this type of action (NVD 2015-2019).
Vulnerability (I) discovered at Process: software vulnerability found in process Process, which could allow an attack on data integrity, and may be known to attackers. Less than 1 percent of vulnerabilities are specific to this type of action (NVD 2015-2019).
Vulnerability (QI) discovered at Process: software vulnerability found in process Process, which could allow injection of queries into a back-end database, and may be known to attackers. Around 3 percent of vulnerabilities relate to query injection, but around 5 percent of all low complexity attacks are of this type (NVD 2015-2019).
Vulnerability (VA) discovered at Process: software vulnerability found in process Process, which could allow an attack from an adjacent network, and may be known to attackers. Under 2 percent of vulnerabilities require low level access from an adjacent network (NVD 2015-2019), and presumably the majority are in the O/S (i.e. the host).
Vulnerability (VL) discovered at Process: software vulnerability found in process Process, which could allow an attack by a local user, and may be known to attackers. Around 14 percent of vulnerabilities require local user access to the vulnerable device (NVD 2015-2019).
Vulnerability (VN) discovered at Process: software vulnerability found in process Process, which could allow an attack from a remote network, and may be known to attackers. Around 84 percent of vulnerabilities can be accessed from a remote network (NVD 2015-2019).
Vulnerability (W) discovered at Process: software vulnerability found in process Process, which could allow an attack by self-propagating malware, and may be known to attackers. Statistics not analysed, but should be less likely than user-level access because someone would need to know about the vulnerability and then develop fully automated and self-propagating malware able to attack it.
Vulnerability (XS) discovered at Process: software vulnerability found in process Process, which could allow a cross-site scripting attack on a client, and may be known to attackers. Around 14 percent of vulnerabilities relate to cross site scripting, including 32 percent of vulnerabilities relating to medium complexity exploits (NVD 2015-2019).