目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-125 跨界内存读 类漏洞列表 2925

CWE-125 跨界内存读 类弱点 2925 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-125 越界读取属于内存安全漏洞,指程序访问了缓冲区边界之外的内存区域。攻击者利用此缺陷可读取敏感数据或引发信息泄露,甚至通过特定构造触发逻辑错误以辅助后续攻击。开发者应严格实施边界检查,确保索引在有效范围内,并使用支持自动边界检测的高级语言或静态分析工具,从源头杜绝非法内存访问。

MITRE CWE 官方描述
CWE:CWE-125 Out-of-bounds Read 英文:The product reads data past the end, or before the beginning, of the intended buffer. 中文:该产品在预期缓冲区(buffer)的末尾之后或开头之前读取数据。
常见影响 (4)
ConfidentialityRead Memory
An attacker could get secret values such as cryptographic keys, PII, memory addresses, or other information that could be used in additional attacks.
ConfidentialityBypass Protection Mechanism
Out-of-bounds memory could contain memory addresses or other information that can be used to bypass ASLR and other protection mechanisms in order to improve the reliability of exploiting a separate weakness for code execution.
AvailabilityDoS: Crash, Exit, or Restart
An attacker could cause a segmentation fault or crash by causing memory to be read outside of the bounds of the buffer. This is especially likely when the code reads a variable amount of data and assumes that a sentinel exists to stop the read operation, such as a NUL in a string.
OtherVaries by Context
The read operation could produce other undefined or unexpected results.
缓解措施 (2)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Architecture and DesignUse a language that provides appropriate memory abstractions.
代码示例 (2)
In the following code, the method retrieves a value from an array at a specific array index location that is given as an input parameter to the method
int getValueFromArray(int *array, int len, int index) { int value; // check that the array index is less than the maximum // length of the array if (index < len) { // get the value at the specified index of the array value = array[index]; } // if array index is invalid then output error message // and return value indicating error else { printf("Value is: %d\n", array[index]); value = -1; } return value; }
Bad · C
... // check that the array index is within the correct // range of values for the array if (index >= 0 && index < len) { ...
Good · C
In the following C/C++ example the method processMessageFromSocket() will get a message from a socket, placed into a buffer, and will parse the contents of the buffer into a structure that contains the message length and the message body. A for loop is used to copy the message body into a local character string which will be passed to another method for processing.
int processMessageFromSocket(int socket) { int success; char buffer[BUFFER_SIZE]; char message[MESSAGE_SIZE]; // get message from socket and store into buffer //Ignoring possibliity that buffer > BUFFER_SIZE if (getMessage(socket, buffer, BUFFER_SIZE) > 0) { // place contents of the buffer into message structure ExMessage *msg = recastBuffer(buffer); // copy message body into string for processing int index; for (index = 0; index < msg->msgLength; index++) { message[index] = msg->msgBody[index]; } message[index] = '\0'; // process message success = processMessage(message); } return success; }
Bad · C
CVE ID标题CVSS风险等级Published
CVE-2020-9211 Huawei Mate 30 安全漏洞 — HUAWEI Mate 30 6.4 Medium2024-12-27
CVE-2024-51471 IBM MQ Appliance 缓冲区错误漏洞 — MQ Appliance 5.3 Medium2024-12-19
CVE-2024-11616 Netskope Endpoint DLP 安全漏洞 — Endpoint DLP 8.8 -2024-12-19
CVE-2022-44517 Adobe Acrobat Reader DC 缓冲区错误漏洞 — Acrobat Reader 5.5 Medium2024-12-18
CVE-2022-44516 Adobe Acrobat Reader DC 缓冲区错误漏洞 — Acrobat Reader 5.5 Medium2024-12-18
CVE-2022-44515 Adobe Acrobat Reader DC 缓冲区错误漏洞 — Acrobat Reader 5.5 Medium2024-12-18
CVE-2024-47039 Google Pixel 安全漏洞 — Android 5.5 -2024-12-18
CVE-2024-11614 DPDK Vhost Library 缓冲区错误漏洞 6.5 -2024-12-18
CVE-2024-12212 Horner Automation Cscape 缓冲区错误漏洞 — Cscape 7.8 High2024-12-13
CVE-2024-9508 Horner Automation Cscape 缓冲区错误漏洞 — Cscape 7.8 High2024-12-13
CVE-2024-54109 Huawei HarmonyOS 安全漏洞 — HarmonyOS 6.5 Medium2024-12-12
CVE-2024-54108 Huawei HarmonyOS 安全漏洞 — HarmonyOS 6.5 Medium2024-12-12
CVE-2024-54107 Huawei HarmonyOS 安全漏洞 — HarmonyOS 7.1 High2024-12-12
CVE-2024-47778 GStreamer 缓冲区错误漏洞 — gstreamer 8.1 -2024-12-11
CVE-2024-47777 GStreamer 缓冲区错误漏洞 — gstreamer 5.5 -2024-12-11
CVE-2024-47776 GStreamer 缓冲区错误漏洞 — gstreamer 7.1 -2024-12-11
CVE-2024-47775 GStreamer 缓冲区错误漏洞 — gstreamer 7.1 -2024-12-11
CVE-2024-47774 GStreamer 缓冲区错误漏洞 — gstreamer 7.1 -2024-12-11
CVE-2024-47600 GStreamer 缓冲区错误漏洞 — gstreamer 7.1 -2024-12-11
CVE-2024-47598 GStreamer 缓冲区错误漏洞 — gstreamer 5.5 -2024-12-11
CVE-2024-47597 GStreamer 缓冲区错误漏洞 — gstreamer 5.5 -2024-12-11
CVE-2024-47596 GStreamer 缓冲区错误漏洞 — gstreamer 7.8 -2024-12-11
CVE-2024-47543 GStreamer 缓冲区错误漏洞 — gstreamer 7.1 -2024-12-11
CVE-2024-53004 Adobe Substance 3D Modeler 缓冲区错误漏洞 — Substance3D - Modeler 5.5 Medium2024-12-10
CVE-2024-53005 Adobe Substance 3D Modeler 缓冲区错误漏洞 — Substance3D - Modeler 5.5 Medium2024-12-10
CVE-2024-53951 Adobe InDesign 缓冲区错误漏洞 — InDesign Desktop 5.5 Medium2024-12-10
CVE-2024-49547 Adobe InDesign 缓冲区错误漏洞 — InDesign Desktop 5.5 Medium2024-12-10
CVE-2024-49548 Adobe InDesign 缓冲区错误漏洞 — InDesign Desktop 5.5 Medium2024-12-10
CVE-2024-49549 Adobe InDesign 缓冲区错误漏洞 — InDesign Desktop 5.5 Medium2024-12-10
CVE-2024-49546 Adobe InDesign 缓冲区错误漏洞 — InDesign Desktop 5.5 Medium2024-12-10

CWE-125(跨界内存读) 是常见的弱点类别,本平台收录该类弱点关联的 2925 条 CVE 漏洞。