Description
The product detects a specific error, but takes no actions to handle the error.
Potential Impact
Integrity, Other
Varies by Context, Unexpected State, Alter Execution Logic
Demonstrative Examples
foo=malloc(sizeof(char)); //the next line checks to see if malloc failedif (foo==NULL) {//We do nothing so we just ignore the error.}foo=malloc(sizeof(char)); //the next line checks to see if malloc failedif (foo==NULL) {printf("Malloc failed to allocate memory resources");return -1;}char* readfile (char *filename) {
try {
// open input fileifstream infile;infile.open(filename);
if (!infile.is_open()) {throw "Unable to open file " + filename;}
// get length of fileinfile.seekg (0, ios::end);int length = infile.tellg();infile.seekg (0, ios::beg);
// allocate memorychar *buffer = new char [length];
// read data from fileinfile.read (buffer,length);
if (!infile.good()) {throw "Unable to read from file " + filename;}
infile.close();
return buffer;
}catch (...) {/* bug: insert code to handle this later */}
}char* readFile (char *filename) {
try {
// open input fileifstream infile;infile.open(filename);
if (!infile.is_open()) {throw "Unable to open file " + filename;}
// get length of fileinfile.seekg (0, ios::end);int length = infile.tellg();infile.seekg (0, ios::beg);
// allocate memorychar *buffer = new char [length];
// read data from fileinfile.read (buffer,length);
if (!infile.good()) {throw "Unable to read from file " + filename;}infile.close();
return buffer;
}catch (char *str) {printf("Error: %s \n", str);infile.close();throw str;}catch (...) {printf("Error occurred trying to read from file \n");infile.close();throw;}
}public String readFile(String filename) {
String retString = null;try {
// initialize File and FileReader objectsFile file = new File(filename);FileReader fr = new FileReader(file);
// initialize character bufferlong fLen = file.length();char[] cBuf = new char[(int) fLen];
// read data from fileint iRead = fr.read(cBuf, 0, (int) fLen);
// close filefr.close();
retString = new String(cBuf);
} catch (Exception ex) {/* do nothing, but catch so it'll compile... */}return retString;
}public String readFile(String filename) throws FileNotFoundException, IOException, Exception {
String retString = null;try {
// initialize File and FileReader objectsFile file = new File(filename);FileReader fr = new FileReader(file);
// initialize character bufferlong fLen = file.length();char [] cBuf = new char[(int) fLen];
// read data from fileint iRead = fr.read(cBuf, 0, (int) fLen);
// close filefr.close();
retString = new String(cBuf);
} catch (FileNotFoundException ex) {System.err.println ("Error: FileNotFoundException opening the input file: " + filename );System.err.println ("" + ex.getMessage() );throw new FileNotFoundException(ex.getMessage());} catch (IOException ex) {System.err.println("Error: IOException reading the input file.\n" + ex.getMessage() );throw new IOException(ex);} catch (Exception ex) {System.err.println("Error: Exception reading the input file.\n" + ex.getMessage() );throw new Exception(ex);}return retString;
}Mitigations & Prevention
Properly handle each exception. This is the recommended solution. Ensure that all exceptions are handled in such a way that you can be sure of the state of your system at any given moment.
If a function returns an error, it is important to either fix the problem and try again, alert the user that an error has happened and let the program continue, or alert the user and close and cleanup the program.
Subject the product to extensive testing to discover some of the possible instances of where/how errors or return values are not handled. Consider testing techniques such as ad hoc, equivalence partitioning, robustness and fault tolerance, mutation, and fuzzing.
Detection Methods
- Automated Static Analysis High — Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then sea
Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2022-21820 | A GPU data center manager detects an error due to a malformed request but does not act on it, leading to memory corruption. |
Related Weaknesses
Taxonomy Mappings
- CLASP: — Improper error handling
- The CERT Oracle Secure Coding Standard for Java (2011): ERR00-J — Do not suppress or ignore checked exceptions
- Software Fault Patterns: SFP4 — Unchecked Status Condition
Frequently Asked Questions
What is CWE-390?
CWE-390 (Detection of Error Condition Without Action) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product detects a specific error, but takes no actions to handle the error.
How can CWE-390 be exploited?
Attackers can exploit CWE-390 (Detection of Error Condition Without Action) to varies by context, unexpected state, alter execution logic. This weakness is typically introduced during the Implementation phase of software development.
How do I prevent CWE-390?
Key mitigations include: Properly handle each exception. This is the recommended solution. Ensure that all exceptions are handled in such a way that you can be sure of the state of your system at any given moment.
What is the severity of CWE-390?
CWE-390 is classified as a Base-level weakness (Medium abstraction). It has been observed in 1 real-world CVEs.