目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-120 未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出) 类漏洞列表 1766

CWE-120 未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出) 类弱点 1766 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-120 即经典缓冲区溢出,属于内存安全漏洞。当程序将输入数据复制到输出缓冲区时,若未验证输入大小是否超出目标容量,会导致内存越界写入。攻击者利用此缺陷可覆盖相邻内存数据,进而执行恶意代码或导致系统崩溃。开发者应严格校验输入长度,使用安全的边界检查函数,并确保目标缓冲区足够大,从而从根本上杜绝此类风险。

MITRE CWE 官方描述
CWE:CWE-120 未检查输入大小的缓冲区复制('Classic Buffer Overflow') 英文:产品将输入缓冲区复制到输出缓冲区,但未验证输入缓冲区的大小是否小于输出缓冲区的大小。
常见影响 (2)
Integrity, Confidentiality, AvailabilityModify Memory, Execute Unauthorized Code or Commands
Buffer overflows often can be used to execute arbitrary code, which is usually outside the scope of the product's implicit security policy. This can often be used to subvert any other security service.
AvailabilityModify Memory, DoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU)
Buffer overflows generally lead to crashes. Other attacks leading to lack of availability are possible, including putting the product into an infinite loop.
缓解措施 (5)
RequirementsUse a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. For example, many languages that perform their own memory management, such as Java and Perl, are not subject to buffer overflows. Other languages, such as Ada and C#, typically provide overflow protection, but the protection can be disabled by the programmer. Be wary that a lan…
Architecture and DesignUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. Examples include the Safe C String Library (SafeStr) by Messier and Viega [REF-57], and the Strsafe.h library from Microsoft [REF-56]. These libraries provide safer versions of overflow-prone string-handling functions.
Operation, Build and CompilationUse automatic buffer overflow detection mechanisms that are offered by certain compilers or compiler extensions. Examples include: the Microsoft Visual Studio /GS flag, Fedora/Red Hat FORTIFY_SOURCE GCC flag, StackGuard, and ProPolice, which provide various mechanisms including canary-based detection and range/index checking. D3-SFCV (Stack Frame Canary Validation) from D3FEND [REF-1334] discusses…
Effectiveness: Defense in Depth
ImplementationConsider adhering to the following rules when allocating and managing an application's memory: Double check that your buffer is as large as you specify. When using functions that accept a number of bytes to copy, such as strncpy(), be aware that if the destination buffer size is equal to the source buffer size, it may not NULL-terminate the string. Check buffer boundaries if accessing the buffer i…
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
代码示例 (2)
The following code asks the user to enter their last name and then attempts to store the value entered in the last_name array.
char last_name[20]; printf ("Enter your last name: "); scanf ("%s", last_name);
Bad · C
The following code attempts to create a local copy of a buffer to perform some manipulations to the data.
void manipulate_string(char * string){ char buf[24]; strcpy(buf, string); ... }
Bad · C
CVE ID标题CVSS风险等级Published
CVE-2026-8137 Totolink X5000R formDdns缓冲区溢出漏洞 — X5000R 8.8 High2026-05-08
CVE-2026-6691 MongoDB C Driver Cyrus SASL 标准化缓冲区溢出漏洞 — MongoDB C Driver 7.8 High2026-05-06
CVE-2026-7857 D-Link DI-8100 用户组 CGI sprintf 缓冲区溢出漏洞 — DI-8100 7.2 High2026-05-05
CVE-2026-7856 D-Link DI-8100 Web管理缓冲区溢出漏洞 — DI-8100 7.2 High2026-05-05
CVE-2026-7855 D-Link DI-8100 tggl.asp 缓冲区溢出漏洞 — DI-8100 8.8 High2026-05-05
CVE-2026-7854 D-Link DI-8100 url_rule.asp POST参数缓冲区溢出漏洞 — DI-8100 9.8 Critical2026-05-05
CVE-2026-7853 D-Link DI-8100 HTTP auto_reboot.asp sprintf缓冲区溢出漏洞 — DI-8100 9.8 Critical2026-05-05
CVE-2026-34956 OpenVSwitch 拒绝服务漏洞 — Fast Datapath for RHEL 7 5.9 Medium2026-05-05
CVE-2025-47404 车载音频软件输入缓冲区溢出漏洞 — Snapdragon 6.5 Medium2026-05-04
CVE-2026-7750 Totolink N300RH CSTECGI.cgi POST请求缓冲区溢出漏洞 — N300RH 8.8 High2026-05-04
CVE-2026-7749 Totolink N300RH cstecgi.cgi缓冲区溢出漏洞 — N300RH 8.8 High2026-05-04
CVE-2026-7748 Totolink N300RH setUpgradeFW 缓冲区溢出漏洞 — N300RH 8.8 High2026-05-04
CVE-2026-7747 Totolink N300RH cstecgi.cgi 认证缓冲区溢出漏洞 — N300RH 9.8 Critical2026-05-04
CVE-2026-20449 Modem因堆缓冲区溢出可导致远程拒绝服务 — MediaTek chipset 7.5AIHighAI2026-05-04
CVE-2026-7735 osrg GoBGP PathAttributeAigp.DecodeFromBytes缓冲区溢出漏洞 — GoBGP 7.3 High2026-05-04
CVE-2026-7719 Totolink WA300 cstecgi.cgi登录认证缓冲区溢出漏洞 — WA300 9.8 Critical2026-05-04
CVE-2026-7717 Totolink WA300 POST cstecgi.cgi上传模块缓冲区溢出漏洞 — WA300 8.8 High2026-05-04
CVE-2026-7685 Edimax BR-6208AC setWAN缓冲区溢出漏洞 — BR-6208AC 8.8 High2026-05-03
CVE-2026-7684 Edimax BR-6428nC 设置WAN缓冲区溢出漏洞 — BR-6428nC 8.8 High2026-05-03
CVE-2026-7675 深圳立必拓LBT-T300-HW1应用配置启动LAN缓冲区溢出漏洞 — LBT-T300-HW1 8.8 High2026-05-03
CVE-2026-7674 深圳力比拓LBT-T300-HW1 Web管理缓冲区溢出漏洞 — LBT-T300-HW1 8.8 High2026-05-03
CVE-2026-7607 TRENDnet TEW-821DAP 自动更新缓冲区溢出漏洞 — TEW-821DAP 8.8 High2026-05-02
CVE-2026-7513 UTT HiPER 1200GW formRemoteControl缓冲区溢出漏洞 — HiPER 1200GW 8.8 High2026-04-30
CVE-2026-7512 UTT HiPER 1200GW formUser缓冲区溢出漏洞 — HiPER 1200GW 8.8 High2026-04-30
CVE-2026-5404 Wireshark 缓冲区溢出漏洞 — Wireshark 4.7 Medium2026-04-30
CVE-2026-7503 cstecgi.cgi setWiFiMultipleConfig缓冲区溢出漏洞 — for Plugin 8.8 High2026-04-30
CVE-2026-7420 UTT HiPER 1250GW 缓冲区错误漏洞 — HiPER 1250GW 8.8 High2026-04-29
CVE-2026-7419 UTT HiPER 1250GW 缓冲区错误漏洞 — HiPER 1250GW 8.8 High2026-04-29
CVE-2026-7418 UTT HiPER 1250GW 缓冲区错误漏洞 — HiPER 1250GW 8.8 High2026-04-29
CVE-2018-25315 Alloksoft Video joiner 安全漏洞 — Video Joiner 8.4 High2026-04-29

CWE-120(未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)) 是常见的弱点类别,本平台收录该类弱点关联的 1766 条 CVE 漏洞。