32 vulnerabilities classified as CWE-123 (任意地址可写任意内容条件). AI Chinese analysis included.
CWE-123 represents a critical memory safety vulnerability where an attacker gains the ability to write arbitrary data to arbitrary memory locations, frequently resulting from unchecked buffer overflows. This weakness allows malicious actors to overwrite critical program structures, such as return addresses or function pointers, thereby hijacking control flow to execute injected shellcode or arbitrary commands. Exploitation typically involves crafting specific input that exceeds buffer boundaries, corrupting adjacent memory to achieve remote code execution or privilege escalation. To mitigate this risk, developers must implement rigorous bounds checking on all array accesses and buffer operations. Utilizing modern, memory-safe programming languages that handle memory management automatically, employing compiler-based protections like stack canaries and Address Space Layout Randomization, and conducting thorough static and dynamic code analysis are essential strategies to prevent such arbitrary writes and ensure application integrity.
#define BUFSIZE 256 int main(int argc, char **argv) { char *buf1 = (char *) malloc(BUFSIZE); char *buf2 = (char *) malloc(BUFSIZE); strcpy(buf1, argv[1]); free(buf2); }| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2018-15376 | Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers Arbitrary Memory Write Vulnerabilities — Cisco IOS Software | 6.7 | - | 2018-10-05 |
| CVE-2018-15375 | Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers Arbitrary Memory Write Vulnerabilities — Cisco IOS Software | 6.7 | - | 2018-10-05 |
Vulnerabilities classified as CWE-123 (任意地址可写任意内容条件) represent 32 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.