目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-125 跨界内存读 类漏洞列表 2901

CWE-125 跨界内存读 类弱点 2901 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-125 越界读取属于内存安全漏洞,指程序访问了缓冲区边界之外的内存区域。攻击者利用此缺陷可读取敏感数据或引发信息泄露,甚至通过特定构造触发逻辑错误以辅助后续攻击。开发者应严格实施边界检查,确保索引在有效范围内,并使用支持自动边界检测的高级语言或静态分析工具,从源头杜绝非法内存访问。

MITRE CWE 官方描述
CWE:CWE-125 Out-of-bounds Read 英文:The product reads data past the end, or before the beginning, of the intended buffer. 中文:该产品在预期缓冲区(buffer)的末尾之后或开头之前读取数据。
常见影响 (4)
ConfidentialityRead Memory
An attacker could get secret values such as cryptographic keys, PII, memory addresses, or other information that could be used in additional attacks.
ConfidentialityBypass Protection Mechanism
Out-of-bounds memory could contain memory addresses or other information that can be used to bypass ASLR and other protection mechanisms in order to improve the reliability of exploiting a separate weakness for code execution.
AvailabilityDoS: Crash, Exit, or Restart
An attacker could cause a segmentation fault or crash by causing memory to be read outside of the bounds of the buffer. This is especially likely when the code reads a variable amount of data and assumes that a sentinel exists to stop the read operation, such as a NUL in a string.
OtherVaries by Context
The read operation could produce other undefined or unexpected results.
缓解措施 (2)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Architecture and DesignUse a language that provides appropriate memory abstractions.
代码示例 (2)
In the following code, the method retrieves a value from an array at a specific array index location that is given as an input parameter to the method
int getValueFromArray(int *array, int len, int index) { int value; // check that the array index is less than the maximum // length of the array if (index < len) { // get the value at the specified index of the array value = array[index]; } // if array index is invalid then output error message // and return value indicating error else { printf("Value is: %d\n", array[index]); value = -1; } return value; }
Bad · C
... // check that the array index is within the correct // range of values for the array if (index >= 0 && index < len) { ...
Good · C
In the following C/C++ example the method processMessageFromSocket() will get a message from a socket, placed into a buffer, and will parse the contents of the buffer into a structure that contains the message length and the message body. A for loop is used to copy the message body into a local character string which will be passed to another method for processing.
int processMessageFromSocket(int socket) { int success; char buffer[BUFFER_SIZE]; char message[MESSAGE_SIZE]; // get message from socket and store into buffer //Ignoring possibliity that buffer > BUFFER_SIZE if (getMessage(socket, buffer, BUFFER_SIZE) > 0) { // place contents of the buffer into message structure ExMessage *msg = recastBuffer(buffer); // copy message body into string for processing int index; for (index = 0; index < msg->msgLength; index++) { message[index] = msg->msgBody[index]; } message[index] = '\0'; // process message success = processMessage(message); } return success; }
Bad · C
CVE ID标题CVSS风险等级Published
CVE-2020-24434 Adobe Reader 缓冲区错误漏洞 — Acrobat Reader 3.3 Low2020-11-05
CVE-2020-24426 Adobe Reader 缓冲区错误漏洞 — Acrobat Reader 3.3 Low2020-11-05
CVE-2020-1915 Facebook Hermes 缓冲区错误漏洞 — Hermes 5.9 -2020-10-26
CVE-2020-15265 Google TensorFlow 缓冲区错误漏洞 — tensorflow 5.9 Medium2020-10-21
CVE-2020-24418 Adobe After Effects 缓冲区错误漏洞 — After Effects 7.8 High2020-10-21
CVE-2020-9750 Adobe Animate 缓冲区错误漏洞 — Animate 7.8 High2020-10-21
CVE-2020-9749 Adobe Animate 缓冲区错误漏洞 — Animate 7.8 High2020-10-21
CVE-2020-24410 Adobe Illustrator 缓冲区错误漏洞 — Illustrator 7.8 High2020-10-20
CVE-2020-24409 Adobe Illustrator 缓冲区错误漏洞 — Illustrator 7.8 High2020-10-20
CVE-2020-6104 F2fs.Fsck 缓冲区错误漏洞 — F2FS-Tools 5.5 -2020-10-15
CVE-2020-25188 LCDS LAquis SCADA 缓冲区错误漏洞 — LAquis SCADA 7.8 -2020-10-14
CVE-2020-12911 AMD Radeon Directx 11 Driver缓冲区错误漏洞 — AMD Graphics Driver for Windows 5.5 -2020-10-13
CVE-2020-12933 AMD Radeon Directx 11 Driver 处理程序功能缓冲区错误漏洞 — AMD Graphics Driver for Windows 5.5 -2020-10-13
CVE-2020-17411 Foxit PhantomPDF 缓冲区错误漏洞 — PhantomPDF 3.3 -2020-10-13
CVE-2020-5140 SonicWall SonicOS 缓冲区错误漏洞 — SonicOS 7.5 -2020-10-12
CVE-2020-5134 SonicWall SonicOS 缓冲区错误漏洞 — SonicOS 6.5 -2020-10-12
CVE-2020-7466 MPD 缓冲区错误漏洞 — MPD: FreeBSD PPP daemon 7.5 -2020-10-06
CVE-2020-14377 Ubuntu DPDK 缓冲区错误漏洞 — dpdk 7.1 -2020-09-30
CVE-2020-15208 Google TensorFlow 缓冲区错误漏洞 — tensorflow 7.4 High2020-09-25
CVE-2020-15211 Google TensorFlow 缓冲区错误漏洞 — tensorflow 4.8 Medium2020-09-25
CVE-2020-9745 Adobe Media Encoder 缓冲区错误漏洞 — Media Encoder 6.1 Medium2020-09-18
CVE-2020-9744 Adobe Media Encoder 缓冲区错误漏洞 — Media Encoder 6.1 Medium2020-09-18
CVE-2020-9739 Adobe Media Encoder 缓冲区错误漏洞 — Media Encoder 6.1 Medium2020-09-18
CVE-2020-14314 Linux kernel 缓冲区错误漏洞 — kernel 5.5 Medium2020-09-15
CVE-2020-9726 Adobe Framemaker 缓冲区错误漏洞 — FrameMaker 6.1 Medium2020-09-10
CVE-2020-14364 QEMU 安全漏洞 — QEMU 6.1 -2020-08-31
CVE-2020-17390 Corel Parallels Desktop 缓冲区错误漏洞 — Desktop 8.8 -2020-08-25
CVE-2020-8870 Foxit Studio Photo 缓冲区错误漏洞 — Studio Photo 8.8 -2020-08-19
CVE-2020-15630 Foxit Studio Photo 缓冲区错误漏洞 — Studio Photo 7.3 -2020-08-19
CVE-2020-16219 Delta Electronics TPEditor 缓冲区错误漏洞 — Delta Electronics TPEditor 7.8 -2020-08-06

CWE-125(跨界内存读) 是常见的弱点类别,本平台收录该类弱点关联的 2901 条 CVE 漏洞。