目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-190 整数溢出或超界折返 类漏洞列表 814

CWE-190 整数溢出或超界折返 类弱点 814 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-190 是整数溢出或环绕漏洞,指程序在计算时未考虑数值范围,导致结果超出存储容量并发生回绕。攻击者常通过构造极大输入值,使整数运算结果异常变小,从而绕过安全逻辑或引发缓冲区溢出。开发者应避免假设结果必然大于原值,需在使用前验证输入范围,并采用支持溢出检测的安全库或静态分析工具,确保算术运算在预期范围内安全执行。

MITRE CWE 官方描述
CWE:CWE-190 整数溢出或回绕 (Integer Overflow or Wraparound) 英文:产品在执行计算时,如果其逻辑假设结果值始终大于原始值,则可能导致整数溢出或回绕 (Integer Overflow or Wraparound)。当整数值递增到一个超出其关联表示法所能存储的范围时,就会发生这种情况。一旦发生这种情况,该值可能会变成一个非常小或负数的值。
常见影响 (5)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (Memory), DoS: Instability
This weakness can generally lead to undefined behavior and therefore crashes. When the calculated result is used for resource allocation, this weakness can cause too many (or too few) resources to be allocated, possibly enabling crashes if the product requests more resources than can be provided.
IntegrityModify Memory
If the value in question is important to data (as opposed to flow), simple data corruption has occurred. Also, if the overflow/wraparound results in other conditions such as buffer overflows, further memory corruption may occur.
Confidentiality, Availability, Access ControlExecute Unauthorized Code or Commands, Bypass Protection Mechanism
This weakness can sometimes trigger buffer overflows, which can be used to execute arbitrary code. This is usually outside the scope of the product's implicit security policy.
Availability, OtherAlter Execution Logic, DoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU)
If the overflow/wraparound occurs in a loop index variable, this could cause the loop to terminate at the wrong time - too early, too late, or not at all (i.e., infinite loops). With too many iterations, some loops could consume too many resources such as memory, file handles, etc., possibly leading…
Access ControlBypass Protection Mechanism
If integer values are used in security-critical decisions, such as calculating quotas or allocation limits, integer overflows can be used to cause an incorrect security decision.
缓解措施 (5)
RequirementsEnsure that all protocols are strictly defined, such that all out-of-bounds behavior can be identified simply, and require strict conformance to the protocol.
RequirementsUse a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. If possible, choose a language or compiler that performs automatic bounds checking.
Architecture and DesignUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482]. Use libraries or frameworks that make it easier to handle numbers without unexpected consequences. Examples include safe integer handling packages such as SafeInt (C++) or IntegerLib (C or C++). [REF-106]
ImplementationPerform input validation on any numeric input by ensuring that it is within the expected range. Enforce that the input meets both the minimum and maximum requirements for the expected range. Use unsigned integers where possible. This makes it easier to perform validation for integer overflows. When signed integers are required, ensure that the range check includes minimum values as well as maximum…
ImplementationUnderstand the programming language's underlying representation and how it interacts with numeric calculation (CWE-681). Pay close attention to byte size discrepancies, precision, signed/unsigned distinctions, truncation, conversion and casting between types, "not-a-number" calculations, and how the language handles numbers that are too large or too small for its underlying representation. [REF-7]…
代码示例 (2)
The following image processing code allocates a table for images.
img_t table_ptr; /*struct containing img data, 10kB each*/ int num_imgs; ... num_imgs = get_num_imgs(); table_ptr = (img_t*)malloc(sizeof(img_t)*num_imgs); ...
Bad · C
The following code excerpt from OpenSSH 3.3 demonstrates a classic case of integer overflow:
nresp = packet_get_int(); if (nresp > 0) { response = xmalloc(nresp*sizeof(char*)); for (i = 0; i < nresp; i++) response[i] = packet_get_string(NULL); }
Bad · C
CVE ID标题CVSS风险等级Published
CVE-2026-6664 PgBouncer 网络包解析整数溢出漏洞 — PgBouncer 7.5 High2026-05-09
CVE-2026-42199 Grid 组件行扩展整数溢出导致安全 API 未定义行为 — grid 6.2 Medium2026-05-08
CVE-2026-42217 OpenEXR readVariableLengthInteger函数移位溢出漏洞 — openexr--2026-05-07
CVE-2026-41142 OpenEXR 图像通道调整整数溢出导致堆越界写 — openexr 8.8 High2026-05-07
CVE-2026-42144 CImg 库 PNM 图片解析整数溢出漏洞 — CImg 6.1 Medium2026-05-04
CVE-2026-7598 libssh2 userauth_password整数溢出漏洞 — libssh2 7.3 High2026-05-01
CVE-2026-28532 FRRouting 10.5.3以下 OSPF TLV解析整数溢出漏洞 — frr 6.5 Medium2026-04-30
CVE-2026-42798 Little CMS 2.16-2.18 整数溢出漏洞 — little cms color engine 4.0 Medium2026-04-30
CVE-2026-41605 Apache Thrift 输入验证错误漏洞 — Apache Thrift 9.8AICriticalAI2026-04-28
CVE-2026-41602 Apache Thrift 输入验证错误漏洞 — Apache Thrift 9.8AICriticalAI2026-04-28
CVE-2026-41416 PJSIP 输入验证错误漏洞 — pjproject 7.5AIHighAI2026-04-24
CVE-2026-33666 zserio 输入验证错误漏洞 — zserio 7.5 High2026-04-24
CVE-2026-33662 OP-TEE Trusted OS 输入验证错误漏洞 — optee_os 7.5 High2026-04-24
CVE-2026-32952 go-ntlmssp 输入验证错误漏洞 — go-ntlmssp 5.3 Medium2026-04-24
CVE-2026-41667 ONE 输入验证错误漏洞 — ONE 6.6 Medium2026-04-22
CVE-2026-41666 ONE 输入验证错误漏洞 — ONE 6.6 Medium2026-04-22
CVE-2026-41665 ONE 输入验证错误漏洞 — ONE 6.1 Medium2026-04-22
CVE-2026-41664 ONE 输入验证错误漏洞 — ONE 6.6 Medium2026-04-22
CVE-2026-40450 ONE 输入验证错误漏洞 — ONE 6.6 Medium2026-04-22
CVE-2026-40449 ONE 输入验证错误漏洞 — ONE 6.6 Medium2026-04-22
CVE-2026-40448 ONE 输入验证错误漏洞 — ONE 5.3 Medium2026-04-22
CVE-2026-41144 fprime 输入验证错误漏洞 — fprime--2026-04-21
CVE-2026-40250 OpenEXR 输入验证错误漏洞 — openexr 8.1AIHighAI2026-04-21
CVE-2026-40244 OpenEXR 输入验证错误漏洞 — openexr 7.5AIHighAI2026-04-21
CVE-2026-39886 OpenEXR 输入验证错误漏洞 — openexr 5.3 Medium2026-04-21
CVE-2026-41445 KISS FFT 安全漏洞 — kissfft 8.8 High2026-04-20
CVE-2026-28214 Firebird 安全漏洞 — firebird 6.5AIMediumAI2026-04-17
CVE-2026-40962 FFmpeg 安全漏洞 — FFmpeg 4.9 Medium2026-04-16
CVE-2026-6385 Red Hat AI Inference Server 安全漏洞 — Lightspeed Core 6.5 Medium2026-04-15
CVE-2026-40915 GIMP 安全漏洞 — Red Hat Enterprise Linux 6 5.5 Medium2026-04-15

CWE-190(整数溢出或超界折返) 是常见的弱点类别,本平台收录该类弱点关联的 814 条 CVE 漏洞。