CWE-192 整数强制转换错误 类弱点 4 条 CVE 漏洞汇总,含 AI 中文分析。
CWE-192 整数强制转换错误涉及原始数据类型的类型转换、扩展或截断缺陷。攻击者通常利用此漏洞通过构造特定输入,导致数据完整性受损或系统可用性降低,在特定场景下可能引发更复杂的安全漏洞。开发者应避免不安全的类型转换,确保在数据转换过程中进行严格的范围检查和类型验证,以防止整数溢出或截断带来的安全风险。
DataPacket *packet; int numHeaders; PacketHeader *headers; sock=AcceptSocketConnection(); ReadPacket(packet, sock); numHeaders =packet->headers; if (numHeaders > 100) { ExitError("too many headers!"); } headers = malloc(numHeaders * sizeof(PacketHeader); ParsePacketHeaders(packet, headers);int GetUntrustedInt () { return(0x0000FFFF); } void main (int argc, char **argv) { char path[256]; char *input; int i; short s; unsigned int sz; i = GetUntrustedInt(); s = i; /* s is -1 so it passes the safety check - CWE-697 */ if (s > 256) { DiePainfully("go away!\n"); } /* s is sign-extended and saved in sz */ sz = s; /* output: i=65535, s=-1, sz=4294967295 - your mileage may vary */ printf("i=%d, s=%d, sz=%u\n", i, s, sz); input = GetUserInput("Enter pathname:"); /* strncpy interprets s as unsigned int, so it's treated as MAX_INT (CWE-195), enabling buffer overflow (CWE-119) */ strncpy(pat| CVE ID | 标题 | CVSS | 风险等级 | Published |
|---|---|---|---|---|
| CVE-2022-2639 | Linux kernel 数字错误漏洞 — kernel | 7.8 | - | 2022-09-01 |
| CVE-2014-125012 | FFmpeg 安全漏洞 — FFmpeg | 5.3 | Medium | 2022-06-18 |
| CVE-2014-125011 | FFmpeg 安全漏洞 — FFmpeg | 5.3 | Medium | 2022-06-18 |
| CVE-2021-32996 | FANUC Robotics Virtual Robot Controller 缓冲区错误漏洞 — R-30iA, R-30iA Mate | 7.5 | - | 2022-01-07 |
CWE-192(整数强制转换错误) 是常见的弱点类别,本平台收录该类弱点关联的 4 条 CVE 漏洞。