Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-125 (跨界内存读) — Vulnerability Class 2925

2925 vulnerabilities classified as CWE-125 (跨界内存读). AI Chinese analysis included.

CWE-125, Out-of-bounds Read, is a memory safety weakness where software accesses memory locations outside the designated buffer boundaries, either before its start or past its end. This vulnerability typically arises from insufficient bounds checking during array indexing or pointer arithmetic, allowing attackers to read sensitive data such as stack canaries, cryptographic keys, or internal application state. By leveraging this flaw, adversaries can achieve information disclosure or potentially facilitate further exploitation techniques like heap spraying. Developers mitigate this risk by implementing rigorous input validation, utilizing static analysis tools to detect unsafe memory access patterns, and adopting safer programming languages or libraries that enforce automatic bounds checking. Additionally, employing compiler protections like Address Sanitizer during development helps identify these errors early, ensuring that memory reads remain strictly within allocated limits to prevent unauthorized data exposure.

MITRE CWE Description
The product reads data past the end, or before the beginning, of the intended buffer.
Common Consequences (4)
ConfidentialityRead Memory
An attacker could get secret values such as cryptographic keys, PII, memory addresses, or other information that could be used in additional attacks.
ConfidentialityBypass Protection Mechanism
Out-of-bounds memory could contain memory addresses or other information that can be used to bypass ASLR and other protection mechanisms in order to improve the reliability of exploiting a separate weakness for code execution.
AvailabilityDoS: Crash, Exit, or Restart
An attacker could cause a segmentation fault or crash by causing memory to be read outside of the bounds of the buffer. This is especially likely when the code reads a variable amount of data and assumes that a sentinel exists to stop the read operation, such as a NUL in a string.
OtherVaries by Context
The read operation could produce other undefined or unexpected results.
Mitigations (2)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Architecture and DesignUse a language that provides appropriate memory abstractions.
Examples (2)
In the following code, the method retrieves a value from an array at a specific array index location that is given as an input parameter to the method
int getValueFromArray(int *array, int len, int index) { int value; // check that the array index is less than the maximum // length of the array if (index < len) { // get the value at the specified index of the array value = array[index]; } // if array index is invalid then output error message // and return value indicating error else { printf("Value is: %d\n", array[index]); value = -1; } return value; }
Bad · C
... // check that the array index is within the correct // range of values for the array if (index >= 0 && index < len) { ...
Good · C
In the following C/C++ example the method processMessageFromSocket() will get a message from a socket, placed into a buffer, and will parse the contents of the buffer into a structure that contains the message length and the message body. A for loop is used to copy the message body into a local character string which will be passed to another method for processing.
int processMessageFromSocket(int socket) { int success; char buffer[BUFFER_SIZE]; char message[MESSAGE_SIZE]; // get message from socket and store into buffer //Ignoring possibliity that buffer > BUFFER_SIZE if (getMessage(socket, buffer, BUFFER_SIZE) > 0) { // place contents of the buffer into message structure ExMessage *msg = recastBuffer(buffer); // copy message body into string for processing int index; for (index = 0; index < msg->msgLength; index++) { message[index] = msg->msgBody[index]; } message[index] = '\0'; // process message success = processMessage(message); } return success; }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2024-49541 Illustrator | Out-of-bounds Read (CWE-125) — Illustrator 5.5 Medium2024-12-10
CVE-2024-49532 Acrobat Reader | Out-of-bounds Read (CWE-125) — Acrobat Reader 5.5 Medium2024-12-10
CVE-2024-49534 Acrobat Reader | Out-of-bounds Read (CWE-125) — Acrobat Reader 5.5 Medium2024-12-10
CVE-2024-49533 Acrobat Reader | Out-of-bounds Read (CWE-125) — Acrobat Reader 5.5 Medium2024-12-10
CVE-2024-49113 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability — Windows 10 Version 1809 7.5 High2024-12-10
CVE-2024-49110 Windows Mobile Broadband Driver Elevation of Privilege Vulnerability — Windows 10 Version 1809 6.8 Medium2024-12-10
CVE-2024-49109 Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability — Windows 10 Version 1809 6.6 Medium2024-12-10
CVE-2024-49083 Windows Mobile Broadband Driver Elevation of Privilege Vulnerability — Windows 10 Version 1809 6.8 Medium2024-12-10
CVE-2024-49065 Microsoft Office Remote Code Execution Vulnerability — Microsoft SharePoint Enterprise Server 2016 5.5 Medium2024-12-10
CVE-2024-49111 Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability — Windows 10 Version 1809 6.6 Medium2024-12-10
CVE-2024-49101 Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability — Windows 10 Version 1809 6.6 Medium2024-12-10
CVE-2024-49099 Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability — Windows 10 Version 1809 4.3 Medium2024-12-10
CVE-2024-49098 Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability — Windows 10 Version 1809 4.3 Medium2024-12-10
CVE-2024-49092 Windows Mobile Broadband Driver Elevation of Privilege Vulnerability — Windows 10 Version 1809 6.8 Medium2024-12-10
CVE-2024-53242 Siemens Teamcenter Visualization和Siemens Tecnomatix Plant Simulation 缓冲区错误漏洞 — Teamcenter Visualization V14.2 7.8 High2024-12-10
CVE-2024-11268 PDF File Parsing Vulnerability in Autodesk Revit — Revit 5.5 Medium2024-12-09
CVE-2024-12130 Rockwell Automation Arena® Out of Bounds Read Vulnerability — Arena® 8.4 -2024-12-05
CVE-2024-52545 Lorex 2K Indoor Wi-Fi Security Camera - Out of bounds heap read — 2K Indoor Wi-Fi Security Camera 6.5 Medium2024-12-03
CVE-2024-9978 Liteos_a has an out-of-bounds read vulnerability — OpenHarmony 5.5 Medium2024-12-03
CVE-2024-12082 Ability Runtime has an out-of-bounds read permission bypass vulnerability — OpenHarmony 5.5 Medium2024-12-03
CVE-2024-20138 MediaTek Chipsets 安全漏洞 — MT3605, MT6985, MT6989, MT6990, MT7925, MT7927, MT8195, MT8370, MT8390 7.5 -2024-12-02
CVE-2024-20116 MediaTek Chipsets 安全漏洞 — MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8795T, MT8797, MT8798 4.4 -2024-12-02
CVE-2024-20136 MediaTek Chipsets 安全漏洞 — MT2737, MT6781, MT6789, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8195, MT8370, MT8390, MT8673, MT8676, MT8678, MT8755, MT8775, MT8781, MT8795T, MT8796, MT8798, MT8893 5.5 -2024-12-02
CVE-2024-20127 MediaTek Chipsets 安全漏洞 — MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6896, MT6897, MT6983, MT6985, MT6989, MT8321, MT8666, MT8667, MT8673, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8791T, MT8797, MT8798, MT8863T 7.5 -2024-12-02
CVE-2024-20128 MediaTek Chipsets 安全漏洞 — MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6896, MT6897, MT6983, MT6985, MT6989, MT8321, MT8666, MT8667, MT8673, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8791T, MT8797, MT8798, MT8863T 7.5 -2024-12-02
CVE-2024-20129 MediaTek Chipsets 安全漏洞 — MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6896, MT6897, MT6983, MT6985, MT6989, MT8321, MT8666, MT8667, MT8673, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8791T, MT8797, MT8798, MT8863T 7.5 -2024-12-02
CVE-2024-38658 Fuji Electric V-Server和Fuji Electric V-Server Lite 缓冲区错误漏洞 — V-Server 7.8AIHighAI2024-11-28
CVE-2024-38389 Fuji Electric TELLUS和Fuji Electric TELLUS Lite 缓冲区错误漏洞 — TELLUS 7.8AIHighAI2024-11-28
CVE-2024-41125 Out-of-bounds read in SNMP when decoding a string in Contiki-NG — contiki-ng 8.4 High2024-11-27
CVE-2024-41126 Out-of-bounds read when decoding SNMP messages in Contiki-NG — contiki-ng 8.4 High2024-11-27

Vulnerabilities classified as CWE-125 (跨界内存读) represent 2925 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.