1064 vulnerabilities classified as CWE-119 (内存缓冲区边界内操作的限制不恰当). AI Chinese analysis included.
CWE-119 represents a critical memory safety weakness where software performs read or write operations beyond the intended boundaries of a memory buffer. This flaw typically arises from insufficient validation of input lengths or loop counters, allowing attackers to manipulate program execution flow. By crafting malicious inputs that exceed buffer limits, adversaries can overwrite adjacent memory, corrupt data structures, or inject executable code, often leading to remote code execution or system crashes. Developers mitigate this risk by implementing rigorous bounds checking before any memory access, utilizing safe string handling functions that enforce length limits, and adopting modern programming languages with automatic memory management. Additionally, employing static analysis tools and fuzzing techniques during development helps identify out-of-bounds accesses early, ensuring that all buffer operations remain strictly within allocated memory regions to prevent exploitation.
void host_lookup(char *user_supplied_addr){ struct hostent *hp; in_addr_t *addr; char hostname[64]; in_addr_t inet_addr(const char *cp); /*routine that ensures user_supplied_addr is in the right format for conversion */ validate_addr_form(user_supplied_addr); addr = inet_addr(user_supplied_addr); hp = gethostbyaddr( addr, sizeof(struct in_addr), AF_INET); strcpy(hostname, hp->h_name); }char * copy_input(char *user_supplied_string){ int i, dst_index; char *dst_buf = (char*)malloc(4*sizeof(char) * MAX_SIZE); if ( MAX_SIZE <= strlen(user_supplied_string) ){ die("user string too long, die evil hacker!"); } dst_index = 0; for ( i = 0; i < strlen(user_supplied_string); i++ ){ if( '&' == user_supplied_string[i] ){ dst_buf[dst_index++] = '&'; dst_buf[dst_index++] = 'a'; dst_buf[dst_index++] = 'm'; dst_buf[dst_index++] = 'p'; dst_buf[dst_index++] = ';'; } else if ('<' == user_supplied_string[i] ){ /* encode to < */ } else dst_buf[dst_index++] = user_supplied_string[i]; } return ds| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-3036 | Out of Bounds Slice index in cfnts leads to remote panic — cfnts | 8.6 | High | 2023-06-14 |
| CVE-2023-33124 | Siemens JT2Go 缓冲区错误漏洞 — JT2Go | 7.8 | High | 2023-06-13 |
| CVE-2023-34341 | BMC AMI 缓冲区错误漏洞 — MegaRAC_SPx | 7.2 | High | 2023-06-12 |
| CVE-2023-21628 | Buffer Copy Without Checking Size of Input (`Classic Buffer Overflow`) in WLAN HAL — Snapdragon | 8.4 | High | 2023-06-06 |
| CVE-2022-33267 | Improper restriction of operations within the bounds of memory buffer in Linux — Snapdragon | 6.7 | Medium | 2023-06-06 |
| CVE-2023-27285 | IBM Aspera buffer overflow — Aspera Connect | 8.4 | High | 2023-06-04 |
| CVE-2023-2977 | OpenSC 缓冲区错误漏洞 — OpenSC | 6.8 | - | 2023-06-01 |
| CVE-2023-33975 | RIOT-OS vulnerable to Out of Bounds Write in _rbuf_add — RIOT | 9.8 | Critical | 2023-05-30 |
| CVE-2023-24817 | RIOT-OS vulnerable to Out of Bounds write in routing with SRH — RIOT | 7.5 | High | 2023-05-30 |
| CVE-2023-2970 | MindSpore json_helper.cc UpdateArray memory corruption — MindSpore | 3.5 | Low | 2023-05-30 |
| CVE-2023-2873 | Twister Antivirus IoControlCode filppd.sys 0x80800043 memory corruption — Antivirus | 5.3 | Medium | 2023-05-24 |
| CVE-2023-30774 | LibTIFF 缓冲区错误漏洞 — libtiff | 9.8 | - | 2023-05-19 |
| CVE-2023-30775 | LibTIFF 缓冲区错误漏洞 — libtiff | 8.8 | - | 2023-05-19 |
| CVE-2023-1972 | GNU Binutils 缓冲区错误漏洞 — binutils | 5.5 | - | 2023-05-17 |
| CVE-2022-47393 | CODESYS: Multiple products prone to improperly restricted memory operations — CODESYS Control RTE (SL) | 6.5 | Medium | 2023-05-15 |
| CVE-2023-1729 | Libraw 缓冲区错误漏洞 — LibRaw | 5.5 | - | 2023-05-15 |
| CVE-2023-30986 | Siemens Solid Edge 缓冲区错误漏洞 — Solid Edge SE2023 | 7.8 | High | 2023-05-09 |
| CVE-2023-26285 | IBM MQ denial of service — MQ | 5.9 | Medium | 2023-05-05 |
| CVE-2022-25713 | Improper Restriction of Operations within the Bounds of a Memory Buffer in Automotive — Snapdragon | 7.8 | High | 2023-05-02 |
| CVE-2023-25509 | NVIDIA DGX-1 缓冲区错误漏洞 — NVIDIA DGX servers | 6.0 | Medium | 2023-04-22 |
| CVE-2023-0206 | NVIDIA DGX 安全漏洞 — NVIDIA DGX servers | 7.5 | High | 2023-04-22 |
| CVE-2023-0202 | NVIDIA DGX 安全漏洞 — NVIDIA DGX servers | 7.5 | High | 2023-04-22 |
| CVE-2021-33797 | Artifex Software Artifex MuJS 输入验证错误漏洞 — mujs | 9.8 | - | 2023-04-17 |
| CVE-2023-1579 | GNU Binutils 缓冲区错误漏洞 — binutils | 7.8 | - | 2023-04-03 |
| CVE-2023-0198 | NVIDIA GPU Display Driver for Linux 缓冲区错误漏洞 — vGPU software (guest driver - Linux), vGPU software (Virtual GPU Manager - Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM), , NVIDIA Cloud Gaming (guest driver - Linux), NVIDIA Cloud Gaming (Virtual GPU Manager - Red Hat Enterprise Linux KVM) | 6.6 | Medium | 2023-04-01 |
| CVE-2023-0191 | 多款NVIDIA产品 缓冲区错误漏洞 — vGPU software (guest driver - Windows), vGPU software (guest driver - Linux), vGPU software (Virtual GPU Manager - Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM), NVIDIA Cloud Gaming (guest driver - Windows), NVIDIA Cloud Gaming (guest driver - Linux), NVIDIA Cloud Gaming (Virtual GPU Manager - Red Hat Enterprise Linux KVM) | 7.1 | High | 2023-04-01 |
| CVE-2023-0188 | 多款NVIDIA产品 缓冲区错误漏洞 — vGPU software (guest driver - Windows), vGPU software (guest driver - Linux), vGPU software (Virtual GPU Manager - Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM), NVIDIA Cloud Gaming (guest driver - Windows), NVIDIA Cloud Gaming (guest driver - Linux), NVIDIA Cloud Gaming (Virtual GPU Manager - Red Hat Enterprise Linux KVM) | 5.5 | Medium | 2023-04-01 |
| CVE-2023-1679 | DriverGenius IOCTL mydrivers64.sys 0x9C40A108 memory corruption — DriverGenius | 5.3 | Medium | 2023-03-28 |
| CVE-2023-1678 | DriverGenius IOCTL mydrivers64.sys 0x9C40A0E0 memory corruption — DriverGenius | 5.3 | Medium | 2023-03-28 |
| CVE-2023-1676 | DriverGenius IOCTL mydrivers64.sys 0x9C402088 memory corruption — DriverGenius | 7.8 | High | 2023-03-28 |
Vulnerabilities classified as CWE-119 (内存缓冲区边界内操作的限制不恰当) represent 1064 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.