2925 vulnerabilities classified as CWE-125 (跨界内存读). AI Chinese analysis included.
CWE-125, Out-of-bounds Read, is a memory safety weakness where software accesses memory locations outside the designated buffer boundaries, either before its start or past its end. This vulnerability typically arises from insufficient bounds checking during array indexing or pointer arithmetic, allowing attackers to read sensitive data such as stack canaries, cryptographic keys, or internal application state. By leveraging this flaw, adversaries can achieve information disclosure or potentially facilitate further exploitation techniques like heap spraying. Developers mitigate this risk by implementing rigorous input validation, utilizing static analysis tools to detect unsafe memory access patterns, and adopting safer programming languages or libraries that enforce automatic bounds checking. Additionally, employing compiler protections like Address Sanitizer during development helps identify these errors early, ensuring that memory reads remain strictly within allocated limits to prevent unauthorized data exposure.
int getValueFromArray(int *array, int len, int index) { int value; // check that the array index is less than the maximum // length of the array if (index < len) { // get the value at the specified index of the array value = array[index]; } // if array index is invalid then output error message // and return value indicating error else { printf("Value is: %d\n", array[index]); value = -1; } return value; }... // check that the array index is within the correct // range of values for the array if (index >= 0 && index < len) { ...int processMessageFromSocket(int socket) { int success; char buffer[BUFFER_SIZE]; char message[MESSAGE_SIZE]; // get message from socket and store into buffer //Ignoring possibliity that buffer > BUFFER_SIZE if (getMessage(socket, buffer, BUFFER_SIZE) > 0) { // place contents of the buffer into message structure ExMessage *msg = recastBuffer(buffer); // copy message body into string for processing int index; for (index = 0; index < msg->msgLength; index++) { message[index] = msg->msgBody[index]; } message[index] = '\0'; // process message success = processMessage(message); } return success; }| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-45464 | Siemens Tecnomatix Plant Simulation 缓冲区错误漏洞 — Teamcenter Visualization V14.2 | 7.8 | High | 2024-10-08 |
| CVE-2024-45463 | Siemens Tecnomatix Plant Simulation 缓冲区错误漏洞 — Teamcenter Visualization V14.2 | 7.8 | High | 2024-10-08 |
| CVE-2024-39806 | Liteos_a has an out-of-bounds Read vulnerability — OpenHarmony | 5.5 | Medium | 2024-10-08 |
| CVE-2024-20102 | MediaTek 芯片 安全漏洞 — MT3605, MT6985, MT6989, MT6990, MT7927, MT8678, MT8796, MT8893 | 4.9 | - | 2024-10-07 |
| CVE-2024-20097 | MediaTek 芯片 安全漏洞 — MT6761, MT6765, MT6768, MT6785, MT6789, MT6853, MT6873, MT6885, MT8666, MT8667, MT8673, MT8675, MT8678 | 4.4 | - | 2024-10-07 |
| CVE-2024-20096 | MediaTek 芯片 安全漏洞 — MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8666, MT8667, MT8673, MT8675, MT8678 | 4.4 | - | 2024-10-07 |
| CVE-2024-20095 | MediaTek 芯片 安全漏洞 — MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8666, MT8667, MT8673, MT8675, MT8678 | 4.4 | - | 2024-10-07 |
| CVE-2024-20093 | MediaTek 芯片 安全漏洞 — MT6761, MT6765, MT6768, MT6779, MT6785, MT6853, MT6873, MT6885, MT8385, MT8666, MT8667, MT8766, MT8768, MT8781, MT8788, MT8789 | 4.4 | - | 2024-10-07 |
| CVE-2024-20091 | MediaTek 芯片 安全漏洞 — MT6761, MT6765, MT6768, MT6779, MT6785, MT6853, MT6873, MT6885, MT8385, MT8666, MT8667, MT8766, MT8768, MT8781, MT8788, MT8789 | 4.4 | - | 2024-10-07 |
| CVE-2024-6443 | zephyr: out-of-bound read in utf8_trunc — Zephyr | 6.3 | Medium | 2024-10-04 |
| CVE-2024-8159 | Deep Freeze 9.00.020.5760 - Out-of-bounds read — DeepFreeze | 6.4 | Medium | 2024-10-03 |
| CVE-2024-47136 | JTEKT Kostac PLC Programming Software 安全漏洞 — Kostac PLC Programming Software (Former name: Koyo PLC Programming Software) | 7.8 | High | 2024-10-03 |
| CVE-2024-0116 | NVIDIA Triton Inference Server 安全漏洞 — Triton Inference Server | 4.9 | Medium | 2024-10-01 |
| CVE-2024-7670 | DWFX File Parsing Vulnerabilities in Autodesk Navisworks Desktop Software — Navisworks Freedom | 7.8 | High | 2024-09-30 |
| CVE-2024-41721 | bhyve(8) out-of-bounds read access via XHCI emulation — FreeBSD | 6.8 | - | 2024-09-20 |
| CVE-2024-36980 | OpenPLC 缓冲区错误漏洞 — OpenPLC_v3 | 7.5 | High | 2024-09-18 |
| CVE-2024-36981 | OpenPLC 缓冲区错误漏洞 — OpenPLC_v3 | 7.5 | High | 2024-09-18 |
| CVE-2024-31198 | Out-of-bounds Read in libfluid_msg library — libfluid | 5.3 | Medium | 2024-09-18 |
| CVE-2024-31195 | Out-of-bounds Read in libfluid_msg library — libfluid | 6.5 | Medium | 2024-09-18 |
| CVE-2024-31194 | Out-of-bounds Read in libfluid_msg library — libfluid | 6.5 | Medium | 2024-09-18 |
| CVE-2024-31193 | Out-of-bounds Read in libfluid_msg library — libfluid | 6.5 | Medium | 2024-09-18 |
| CVE-2024-31192 | Out-of-bounds Read in libfluid_msg library — libfluid | 6.5 | Medium | 2024-09-18 |
| CVE-2024-31191 | Out-of-bounds Read in libfluid_msg library — libfluid | 6.5 | Medium | 2024-09-18 |
| CVE-2024-31190 | Out-of-bounds Read in libfluid_msg library — libfluid | 6.5 | Medium | 2024-09-18 |
| CVE-2024-31189 | Out-of-bounds Read in libfluid_msg library — libfluid | 6.5 | Medium | 2024-09-18 |
| CVE-2024-31188 | Out-of-bounds Read in libfluid_msg library — libfluid | 6.5 | Medium | 2024-09-18 |
| CVE-2024-31187 | Out-of-bounds Read in libfluid_msg library — libfluid | 6.5 | Medium | 2024-09-18 |
| CVE-2024-31186 | Out-of-bounds Read in libfluid_msg library — libfluid | 6.5 | Medium | 2024-09-18 |
| CVE-2024-31184 | Out-of-bounds Read in libfluid_msg library — libfluid | 6.5 | Medium | 2024-09-18 |
| CVE-2024-31183 | Out-of-bounds Read in libfluid_msg library — libfluid | 6.5 | Medium | 2024-09-18 |
Vulnerabilities classified as CWE-125 (跨界内存读) represent 2925 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.