Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-191 (整数下溢(超界折返)) — Vulnerability Class 212

212 vulnerabilities classified as CWE-191 (整数下溢(超界折返)). AI Chinese analysis included.

CWE-191, Integer Underflow, is a software weakness occurring when a subtraction operation yields a result smaller than the minimum representable integer value, causing an unintended wraparound. This flaw typically arises in both signed and unsigned integer contexts, leading to incorrect calculations that can compromise program logic. Attackers often exploit this vulnerability to manipulate memory allocation sizes or loop counters, potentially triggering buffer overflows or denial-of-service conditions by forcing the system to allocate insufficient resources or enter infinite loops. To mitigate this risk, developers must implement rigorous input validation to ensure operands remain within safe bounds before arithmetic operations. Additionally, using language features that provide automatic bounds checking or employing larger integer types for intermediate calculations can prevent underflow. Regular static analysis and thorough testing are essential to identify and rectify these subtle arithmetic errors before deployment.

MITRE CWE Description
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result. This can happen in signed and unsigned cases.
Common Consequences (3)
AvailabilityDoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory), DoS: Instability
This weakness will generally lead to undefined behavior and therefore crashes. In the case of overflows involving loop index variables, the likelihood of infinite loops is also high.
IntegrityModify Memory
If the value in question is important to data (as opposed to flow), simple data corruption has occurred. Also, if the wrap around results in other conditions such as buffer overflows, further memory corruption may occur.
Confidentiality, Availability, Access ControlExecute Unauthorized Code or Commands, Bypass Protection Mechanism
This weakness can sometimes trigger buffer overflows which can be used to execute arbitrary code. This is usually outside the scope of a program's implicit security policy.
Examples (2)
The following example subtracts from a 32 bit signed integer.
#include <stdio.h> #include <stdbool.h> main (void) { int i; i = -2147483648; i = i - 1; return 0; }
Bad · C
This code performs a stack allocation based on a length calculation.
int a = 5, b = 6; size_t len = a - b; char buf[len];    // Just blows up the stack }
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2025-43546 Bridge | Integer Underflow (Wrap or Wraparound) (CWE-191) — Bridge 7.8 High2025-05-13
CVE-2025-43555 Animate | Integer Underflow (Wrap or Wraparound) (CWE-191) — Animate 7.8 High2025-05-13
CVE-2025-30324 Photoshop Desktop | Integer Underflow (Wrap or Wraparound) (CWE-191) — Photoshop Desktop 7.8 High2025-05-13
CVE-2025-29974 Windows Kernel Information Disclosure Vulnerability — Windows 10 Version 1507 5.7 Medium2025-05-13
CVE-2025-47256 Libxmp 安全漏洞 — Libxmp 5.6 Medium2025-05-06
CVE-2025-26269 Dragonfly 安全漏洞 — Dragonfly 3.3 Low2025-04-17
CVE-2025-30296 Adobe Framemaker | Integer Underflow (Wrap or Wraparound) (CWE-191) — Adobe Framemaker 7.8 High2025-04-08
CVE-2025-2259 Eclipse ThreadX NetX Duo component HTTP server single PUT request integer underflow — ThreadX 7.5AIHighAI2025-04-06
CVE-2025-2258 Eclipse ThreadX NetX Duo HTTP server single PUT request integer underflow — ThreadX 7.5AIHighAI2025-04-06
CVE-2024-50595 STMicroelectronics X-CUBE-AZRTOS-WL 数字错误漏洞 — X-CUBE-AZRT-H7RS 4.3 Medium2025-04-02
CVE-2024-50594 STMicroelectronics X-CUBE-AZRTOS-WL 数字错误漏洞 — X-CUBE-AZRT-H7RS 4.3 Medium2025-04-02
CVE-2024-50597 STMicroelectronics X-CUBE-AZRTOS-WL 数字错误漏洞 — X-CUBE-AZRT-H7RS 4.3 Medium2025-04-02
CVE-2024-50596 STMicroelectronics X-CUBE-AZRTOS-WL 数字错误漏洞 — X-CUBE-AZRT-H7RS 4.3 Medium2025-04-02
CVE-2025-30356 Heap Buffer Overflow via Incomplete Length Check in `Crypto_TC_ApplySecurity` — CryptoLib 9.8AICriticalAI2025-04-01
CVE-2025-2581 xmedcon DICOM File malloc integer underflow — xmedcon 4.3 Medium2025-03-21
CVE-2025-29909 CryptoLib's Crypto_TC_ApplySecurity() Has a Heap Buffer Overflow Vulnerability — CryptoLib 9.8 -2025-03-17
CVE-2024-10838 Integer Underflow in DDS_Security_Deserialize_ methods may lead to OOB read — Eclipse Cyclone DDS 9.1 -2025-03-12
CVE-2025-0727 Eclipse ThreadX NetX Duo HTTP server single PUT request integer underflow — ThreadX 7.5 -2025-02-21
CVE-2025-0728 Eclipse ThreadX NetX Duo HTTP server single PUT request integer underflow — ThreadX 7.5 -2025-02-21
CVE-2025-21160 Illustrator | Integer Underflow (Wrap or Wraparound) (CWE-191) — Illustrator 7.8 High2025-02-11
CVE-2025-21156 InCopy | Integer Underflow (Wrap or Wraparound) (CWE-191) — InCopy 7.8 High2025-02-11
CVE-2025-21158 InDesign Desktop | Integer Underflow (Wrap or Wraparound) (CWE-191) — InDesign Desktop 7.8 High2025-02-11
CVE-2025-21135 Animate | Integer Underflow (Wrap or Wraparound) (CWE-191) — Animate 7.8 High2025-01-14
CVE-2025-21134 Illustrator on iPad | Integer Underflow (Wrap or Wraparound) (CWE-191) — Illustrator on iPad 7.8 High2025-01-14
CVE-2025-21133 Illustrator on iPad | Integer Underflow (Wrap or Wraparound) (CWE-191) — Illustrator on iPad 7.8 High2025-01-14
CVE-2025-21122 Photoshop Desktop | Integer Underflow (Wrap or Wraparound) (CWE-191) — Photoshop Desktop 7.8 High2025-01-14
CVE-2025-21276 Windows MapUrlToZone Denial of Service Vulnerability — Windows 10 Version 1507 7.5 High2025-01-14
CVE-2024-57823 Raptor RDF Syntax Library 安全漏洞 — Raptor RDF Syntax Library 9.3 Critical2025-01-10
CVE-2024-55627 Suricata segfault on StreamingBufferSlideToOffsetWithRegions — suricata 5.9 Medium2025-01-06
CVE-2024-56375 FORT Validator 安全漏洞 — fort-validator 7.5 -2024-12-22

Vulnerabilities classified as CWE-191 (整数下溢(超界折返)) represent 212 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.