目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-125 跨界内存读 类漏洞列表 2897

CWE-125 跨界内存读 类弱点 2897 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-125 越界读取属于内存安全漏洞,指程序访问了缓冲区边界之外的内存区域。攻击者利用此缺陷可读取敏感数据或引发信息泄露,甚至通过特定构造触发逻辑错误以辅助后续攻击。开发者应严格实施边界检查,确保索引在有效范围内,并使用支持自动边界检测的高级语言或静态分析工具,从源头杜绝非法内存访问。

MITRE CWE 官方描述
CWE:CWE-125 Out-of-bounds Read 英文:The product reads data past the end, or before the beginning, of the intended buffer. 中文:该产品在预期缓冲区(buffer)的末尾之后或开头之前读取数据。
常见影响 (4)
ConfidentialityRead Memory
An attacker could get secret values such as cryptographic keys, PII, memory addresses, or other information that could be used in additional attacks.
ConfidentialityBypass Protection Mechanism
Out-of-bounds memory could contain memory addresses or other information that can be used to bypass ASLR and other protection mechanisms in order to improve the reliability of exploiting a separate weakness for code execution.
AvailabilityDoS: Crash, Exit, or Restart
An attacker could cause a segmentation fault or crash by causing memory to be read outside of the bounds of the buffer. This is especially likely when the code reads a variable amount of data and assumes that a sentinel exists to stop the read operation, such as a NUL in a string.
OtherVaries by Context
The read operation could produce other undefined or unexpected results.
缓解措施 (2)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Architecture and DesignUse a language that provides appropriate memory abstractions.
代码示例 (2)
In the following code, the method retrieves a value from an array at a specific array index location that is given as an input parameter to the method
int getValueFromArray(int *array, int len, int index) { int value; // check that the array index is less than the maximum // length of the array if (index < len) { // get the value at the specified index of the array value = array[index]; } // if array index is invalid then output error message // and return value indicating error else { printf("Value is: %d\n", array[index]); value = -1; } return value; }
Bad · C
... // check that the array index is within the correct // range of values for the array if (index >= 0 && index < len) { ...
Good · C
In the following C/C++ example the method processMessageFromSocket() will get a message from a socket, placed into a buffer, and will parse the contents of the buffer into a structure that contains the message length and the message body. A for loop is used to copy the message body into a local character string which will be passed to another method for processing.
int processMessageFromSocket(int socket) { int success; char buffer[BUFFER_SIZE]; char message[MESSAGE_SIZE]; // get message from socket and store into buffer //Ignoring possibliity that buffer > BUFFER_SIZE if (getMessage(socket, buffer, BUFFER_SIZE) > 0) { // place contents of the buffer into message structure ExMessage *msg = recastBuffer(buffer); // copy message body into string for processing int index; for (index = 0; index < msg->msgLength; index++) { message[index] = msg->msgBody[index]; } message[index] = '\0'; // process message success = processMessage(message); } return success; }
Bad · C
CVE ID标题CVSS风险等级Published
CVE-2026-3508 ASUS MyASUS版本漏洞:IOCTL越界读取致系统崩溃 — ASUS System Control Interface--2026-05-08
CVE-2026-8088 GDAL GDfieldinfo 越界读写漏洞 — gdal 3.3 Low2026-05-07
CVE-2026-8084 GDAL HDF-EOS Grid File SWapi.c memmove 越界漏洞 — gdal 3.3 Low2026-05-07
CVE-2026-42216 OpenEXR IDManifest::init()前缀扩展越界读取漏洞 — openexr--2026-05-07
CVE-2026-7995 Chrome < 148.0.7778.96 越界读取致任意代码执行 — Chrome--2026-05-06
CVE-2026-7981 Chrome <148.0.7778.96 编解码器越界读取漏洞 — Chrome--2026-05-06
CVE-2026-7983 Chrome < 148.0.7778.96越界读取致跨域数据泄露 — Chrome--2026-05-06
CVE-2026-7949 Chrome<148.0.7778.96越界读取漏洞 — Chrome--2026-05-06
CVE-2026-7933 Chrome 148.0.7778.96前越界读漏洞 — Chrome--2026-05-06
CVE-2026-7904 Chrome Fonts越界读取漏洞 (v148.0.7778.96前) — Chrome--2026-05-06
CVE-2026-30923 libModSecurity3 远程拒绝服务漏洞 — ModSecurity--2026-05-05
CVE-2026-34000 Xwayland xkb几何处理越界读取信息泄露及拒绝服务漏洞 — Red Hat Enterprise Linux 10 6.1 Medium2026-05-05
CVE-2026-6918 OpenJ9 0.21-0.58 JITServer 远程拒绝服务漏洞 — Eclipse OpenJ9 6.5AIMediumAI2026-05-05
CVE-2026-33857 Apache HTTP Server AJP获取函数边界外读漏洞 — Apache HTTP Server 7.5AIHighAI2026-05-04
CVE-2026-7482 Ollama GGUF解析越界读取致内存泄露 — ollama 9.1 Critical2026-05-04
CVE-2026-7737 osrg GoBGP BMP Statistics解析越界漏洞 — GoBGP 5.3 Medium2026-05-04
CVE-2026-20447 Alps geniezone漏洞致权限提升 — MediaTek chipset 6.7AIMediumAI2026-05-04
CVE-2026-7668 MikroTik RouterOS SCEP 越界读取漏洞 — RouterOS 7.3 High2026-05-02
CVE-2026-42799 ULP越界读取漏洞 — Kestrel 7.4 High2026-04-30
CVE-2026-40686 Exim<4.99.2 UTF-8越界读取致信息泄露 — Exim 3.7 Low2026-04-30
CVE-2026-7425 FreeRTOS-Plus-TCP 缓冲区错误漏洞 — FreeRTOS-Plus-TCP 6.5 Medium2026-04-29
CVE-2026-2810 Netskope Client 缓冲区错误漏洞 — Client 5.5AIMediumAI2026-04-29
CVE-2026-41607 Apache Thrift 缓冲区错误漏洞 — Apache Thrift 7.5AIHighAI2026-04-28
CVE-2026-41604 Apache Thrift 缓冲区错误漏洞 — Apache Thrift 7.5AIHighAI2026-04-28
CVE-2026-7233 Artifex Software MuPDF 缓冲区错误漏洞 — MuPDF 3.3 Low2026-04-28
CVE-2026-7135 GPAC 缓冲区错误漏洞 — GPAC 5.3 Medium2026-04-27
CVE-2026-41503 BACnet Stack 缓冲区错误漏洞 — bacnet-stack 7.5AIHighAI2026-04-24
CVE-2026-41502 BACnet Stack 缓冲区错误漏洞 — bacnet-stack 9.1AICriticalAI2026-04-24
CVE-2026-41475 BACnet Stack 缓冲区错误漏洞 — bacnet-stack 7.5AIHighAI2026-04-24
CVE-2026-41415 PJSIP 缓冲区错误漏洞 — pjproject 9.1AICriticalAI2026-04-24

CWE-125(跨界内存读) 是常见的弱点类别,本平台收录该类弱点关联的 2897 条 CVE 漏洞。