目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-125 跨界内存读 类漏洞列表 2925

CWE-125 跨界内存读 类弱点 2925 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-125 越界读取属于内存安全漏洞,指程序访问了缓冲区边界之外的内存区域。攻击者利用此缺陷可读取敏感数据或引发信息泄露,甚至通过特定构造触发逻辑错误以辅助后续攻击。开发者应严格实施边界检查,确保索引在有效范围内,并使用支持自动边界检测的高级语言或静态分析工具,从源头杜绝非法内存访问。

MITRE CWE 官方描述
CWE:CWE-125 Out-of-bounds Read 英文:The product reads data past the end, or before the beginning, of the intended buffer. 中文:该产品在预期缓冲区(buffer)的末尾之后或开头之前读取数据。
常见影响 (4)
ConfidentialityRead Memory
An attacker could get secret values such as cryptographic keys, PII, memory addresses, or other information that could be used in additional attacks.
ConfidentialityBypass Protection Mechanism
Out-of-bounds memory could contain memory addresses or other information that can be used to bypass ASLR and other protection mechanisms in order to improve the reliability of exploiting a separate weakness for code execution.
AvailabilityDoS: Crash, Exit, or Restart
An attacker could cause a segmentation fault or crash by causing memory to be read outside of the bounds of the buffer. This is especially likely when the code reads a variable amount of data and assumes that a sentinel exists to stop the read operation, such as a NUL in a string.
OtherVaries by Context
The read operation could produce other undefined or unexpected results.
缓解措施 (2)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Architecture and DesignUse a language that provides appropriate memory abstractions.
代码示例 (2)
In the following code, the method retrieves a value from an array at a specific array index location that is given as an input parameter to the method
int getValueFromArray(int *array, int len, int index) { int value; // check that the array index is less than the maximum // length of the array if (index < len) { // get the value at the specified index of the array value = array[index]; } // if array index is invalid then output error message // and return value indicating error else { printf("Value is: %d\n", array[index]); value = -1; } return value; }
Bad · C
... // check that the array index is within the correct // range of values for the array if (index >= 0 && index < len) { ...
Good · C
In the following C/C++ example the method processMessageFromSocket() will get a message from a socket, placed into a buffer, and will parse the contents of the buffer into a structure that contains the message length and the message body. A for loop is used to copy the message body into a local character string which will be passed to another method for processing.
int processMessageFromSocket(int socket) { int success; char buffer[BUFFER_SIZE]; char message[MESSAGE_SIZE]; // get message from socket and store into buffer //Ignoring possibliity that buffer > BUFFER_SIZE if (getMessage(socket, buffer, BUFFER_SIZE) > 0) { // place contents of the buffer into message structure ExMessage *msg = recastBuffer(buffer); // copy message body into string for processing int index; for (index = 0; index < msg->msgLength; index++) { message[index] = msg->msgBody[index]; } message[index] = '\0'; // process message success = processMessage(message); } return success; }
Bad · C
CVE ID标题CVSS风险等级Published
CVE-2021-28589 Adobe Media Encoder 缓冲区错误漏洞 — Media Encoder 3.3 Low2021-08-20
CVE-2021-28590 Adobe Media Encoder 缓冲区错误漏洞 — Media Encoder 3.3 Low2021-08-20
CVE-2021-37670 Google TensorFlow 缓冲区错误漏洞 — tensorflow 5.5 Medium2021-08-12
CVE-2021-37679 Google TensorFlow 缓冲区错误漏洞 — tensorflow 7.1 High2021-08-12
CVE-2021-37672 Google TensorFlow 缓冲区错误漏洞 — tensorflow 5.5 Medium2021-08-12
CVE-2021-37687 Google TensorFlow缓冲区错误漏洞 — tensorflow 5.5 Medium2021-08-12
CVE-2021-37685 Google TensorFlow 缓冲区错误漏洞 — tensorflow 5.5 Medium2021-08-12
CVE-2021-37651 Google TensorFlow缓冲区错误漏洞 — tensorflow 7.1 High2021-08-12
CVE-2021-37654 Google TensorFlow缓冲区错误漏洞 — tensorflow 7.3 High2021-08-12
CVE-2021-37641 Google TensorFlow缓冲区错误漏洞 — tensorflow 7.3 High2021-08-12
CVE-2021-37635 Google TensorFlow缓冲区错误漏洞 — tensorflow 7.3 High2021-08-12
CVE-2021-37664 Google TensorFlow 缓冲区错误漏洞 — tensorflow 7.3 High2021-08-12
CVE-2021-37655 Google TensorFlow 缓冲区错误漏洞 — tensorflow 7.3 High2021-08-12
CVE-2021-33738 Siemens Teamcenter Visualization和Siemens Jt2go缓冲区错误漏洞 — JT2Go 5.5 -2021-08-10
CVE-2021-37618 Exiv2 缓冲区错误漏洞 — exiv2 4.7 Medium2021-08-09
CVE-2021-37619 Exiv2 缓冲区错误漏洞 — exiv2 4.7 Medium2021-08-09
CVE-2021-37620 Exiv2 缓冲区错误漏洞 — exiv2 4.7 Medium2021-08-09
CVE-2021-32761 Redis 输入验证错误漏洞 — redis 7.5 High2021-07-21
CVE-2021-0277 Juniper Networks Junos OS 和 Junos OS Evolved 缓冲区错误漏洞 — Junos OS 8.8 High2021-07-15
CVE-2021-34315 Siemens Jt2go 和 Siemens Teamcenter Visualization 缓冲区错误漏洞 — JT2Go 7.8 -2021-07-13
CVE-2021-34296 Siemens Jt2go 和 Siemens Teamcenter Visualization 缓冲区错误漏洞 — JT2Go 7.8 -2021-07-13
CVE-2021-34294 Siemens Jt2go 和 Siemens Teamcenter Visualization 缓冲区错误漏洞 — JT2Go 7.8 -2021-07-13
CVE-2021-34292 Siemens Jt2go和Siemens Teamcenter Visualization 缓冲区错误漏洞 — JT2Go 7.8 -2021-07-13
CVE-2021-22918 nodejs 缓冲区错误漏洞 — Node 8.2 -2021-07-12
CVE-2021-20024 SonicWall Switch 缓冲区错误漏洞 — SonicWall Switch 9.1 -2021-07-09
CVE-2021-27412 Delta Electronics Industrial Automation DOPSoft 缓冲区错误漏洞 — Delta Electronics DOPSoft 7.8 -2021-07-02
CVE-2021-27455 Delta Electronics Industrial Automation DOPSoft 缓冲区错误漏洞 — Delta Electronics DOPSoft 5.5 -2021-07-02
CVE-2021-32990 winproladder 缓冲区错误漏洞 — FATEK Automation WinProladder 8.8 -2021-06-29
CVE-2021-31515 Vector 35 Binary Ninja 缓冲区错误漏洞 — Binary Ninja 7.8 -2021-06-29
CVE-2021-31512 OpenText Brava! 缓冲区错误漏洞 — Brava! Desktop 7.8 -2021-06-29

CWE-125(跨界内存读) 是常见的弱点类别,本平台收录该类弱点关联的 2925 条 CVE 漏洞。