目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-120 未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出) 类漏洞列表 1767

CWE-120 未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出) 类弱点 1767 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-120 即经典缓冲区溢出,属于内存安全漏洞。当程序将输入数据复制到输出缓冲区时,若未验证输入大小是否超出目标容量,会导致内存越界写入。攻击者利用此缺陷可覆盖相邻内存数据,进而执行恶意代码或导致系统崩溃。开发者应严格校验输入长度,使用安全的边界检查函数,并确保目标缓冲区足够大,从而从根本上杜绝此类风险。

MITRE CWE 官方描述
CWE:CWE-120 未检查输入大小的缓冲区复制('Classic Buffer Overflow') 英文:产品将输入缓冲区复制到输出缓冲区,但未验证输入缓冲区的大小是否小于输出缓冲区的大小。
常见影响 (2)
Integrity, Confidentiality, AvailabilityModify Memory, Execute Unauthorized Code or Commands
Buffer overflows often can be used to execute arbitrary code, which is usually outside the scope of the product's implicit security policy. This can often be used to subvert any other security service.
AvailabilityModify Memory, DoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU)
Buffer overflows generally lead to crashes. Other attacks leading to lack of availability are possible, including putting the product into an infinite loop.
缓解措施 (5)
RequirementsUse a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. For example, many languages that perform their own memory management, such as Java and Perl, are not subject to buffer overflows. Other languages, such as Ada and C#, typically provide overflow protection, but the protection can be disabled by the programmer. Be wary that a lan…
Architecture and DesignUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. Examples include the Safe C String Library (SafeStr) by Messier and Viega [REF-57], and the Strsafe.h library from Microsoft [REF-56]. These libraries provide safer versions of overflow-prone string-handling functions.
Operation, Build and CompilationUse automatic buffer overflow detection mechanisms that are offered by certain compilers or compiler extensions. Examples include: the Microsoft Visual Studio /GS flag, Fedora/Red Hat FORTIFY_SOURCE GCC flag, StackGuard, and ProPolice, which provide various mechanisms including canary-based detection and range/index checking. D3-SFCV (Stack Frame Canary Validation) from D3FEND [REF-1334] discusses…
Effectiveness: Defense in Depth
ImplementationConsider adhering to the following rules when allocating and managing an application's memory: Double check that your buffer is as large as you specify. When using functions that accept a number of bytes to copy, such as strncpy(), be aware that if the destination buffer size is equal to the source buffer size, it may not NULL-terminate the string. Check buffer boundaries if accessing the buffer i…
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
代码示例 (2)
The following code asks the user to enter their last name and then attempts to store the value entered in the last_name array.
char last_name[20]; printf ("Enter your last name: "); scanf ("%s", last_name);
Bad · C
The following code attempts to create a local copy of a buffer to perform some manipulations to the data.
void manipulate_string(char * string){ char buf[24]; strcpy(buf, string); ... }
Bad · C
CVE ID标题CVSS风险等级Published
CVE-2025-5593 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-06-04
CVE-2025-5592 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-06-04
CVE-2025-5601 Wireshark 安全漏洞 — Wireshark 7.8 High2025-06-04
CVE-2025-5551 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-06-04
CVE-2025-5550 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-06-04
CVE-2025-5549 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-06-04
CVE-2025-5548 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-06-04
CVE-2025-5547 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-06-04
CVE-2024-53013 Qualcomm Chipsets 安全漏洞 — Snapdragon 6.6 Medium2025-06-03
CVE-2025-5408 WAVLINK和ch 安全漏洞 — QUANTUM D2G 9.8 Critical2025-06-01
CVE-2025-5357 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-30
CVE-2025-5356 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-30
CVE-2025-5331 PCMan FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-29
CVE-2025-5330 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-29
CVE-2025-5295 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-28
CVE-2025-5222 International Components for Unicode 安全漏洞 7.0 High2025-05-27
CVE-2025-5221 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-27
CVE-2025-5220 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-27
CVE-2025-5219 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-27
CVE-2025-5218 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-27
CVE-2025-5217 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-27
CVE-2025-5156 H3C GR-5400AX 安全漏洞 — GR-5400AX 8.8 High2025-05-25
CVE-2025-5112 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-23
CVE-2025-5111 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-23
CVE-2025-5110 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-23
CVE-2025-5109 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-23
CVE-2025-5076 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-22
CVE-2025-5075 FreeFloat FTP Server 安全漏洞 — FTP Server 7.3 High2025-05-22
CVE-2025-46714 Sandboxie 安全漏洞 — Sandboxie 7.8 High2025-05-22
CVE-2025-46713 Sandboxie 安全漏洞 — Sandboxie 7.8 High2025-05-22

CWE-120(未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)) 是常见的弱点类别,本平台收录该类弱点关联的 1767 条 CVE 漏洞。