Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-476 (空指针解引用) — Vulnerability Class 1138

1138 vulnerabilities classified as CWE-476 (空指针解引用). AI Chinese analysis included.

CWE-476 represents a critical memory management weakness where software attempts to access memory through a pointer that holds a NULL value instead of a valid address. This error typically occurs when a function fails to allocate memory or validate input, yet the code proceeds to dereference the resulting null reference without checking its status. Attackers exploit this vulnerability by triggering the null condition, often causing the application to crash and resulting in a denial of service. In more complex scenarios, if the NULL pointer is manipulated to point to executable code, it may lead to arbitrary code execution or privilege escalation. To prevent this, developers must rigorously validate all pointers before use, ensuring they are not NULL. Implementing defensive programming practices, such as using assertions during development and comprehensive error handling in production, helps mitigate the risk of dereferencing invalid memory addresses.

MITRE CWE Description
The product dereferences a pointer that it expects to be valid but is NULL.
Common Consequences (2)
AvailabilityDoS: Crash, Exit, or Restart
NULL pointer dereferences usually result in the failure of the process unless exception handling (on some platforms) is available and implemented. Even when exception handling is being used, it can still be very difficult to return the software to a safe state of operation.
Integrity, ConfidentialityExecute Unauthorized Code or Commands, Read Memory, Modify Memory
In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution.
Mitigations (5)
ImplementationFor any pointers that could have been modified or provided from a function that can return NULL, check the pointer for NULL before use. When working with a multithreaded or otherwise asynchronous environment, ensure that proper locking APIs are used to lock before the check, and unlock when it has finished [REF-1484].
RequirementsSelect a programming language that is not susceptible to these issues.
ImplementationCheck the results of all functions that return a value and verify that the value is non-null before acting upon it.
Effectiveness: Moderate
Architecture and DesignIdentify all variables and data stores that receive information from external sources, and apply input validation to make sure that they are only initialized to expected values.
ImplementationExplicitly initialize all variables and other data stores, either during declaration or just before the first usage.
Examples (2)
This example takes an IP address from a user, verifies that it is well formed and then looks up the hostname and copies it into a buffer.
void host_lookup(char *user_supplied_addr){ struct hostent *hp; in_addr_t *addr; char hostname[64]; in_addr_t inet_addr(const char *cp); /*routine that ensures user_supplied_addr is in the right format for conversion */ validate_addr_form(user_supplied_addr); addr = inet_addr(user_supplied_addr); hp = gethostbyaddr( addr, sizeof(struct in_addr), AF_INET); strcpy(hostname, hp->h_name); }
Bad · C
In the following code, the programmer assumes that the system always has a property named "cmd" defined. If an attacker can control the program's environment so that "cmd" is not defined, the program throws a NULL pointer exception when it attempts to call the trim() method.
String cmd = System.getProperty("cmd"); cmd = cmd.trim();
Bad · Java
CVE IDTitleCVSSSeverityPublished
CVE-2024-37042 QTS, QuTS hero — QTS 4.9 -2024-11-22
CVE-2024-37045 QTS, QuTS hero — QTS 4.9 -2024-11-22
CVE-2024-37048 QTS, QuTS hero — QTS 4.9 -2024-11-22
CVE-2024-11588 AVL-DiTEST-DiagDev libdoip DoIPConnection.cpp reactOnReceivedTcpMessage null pointer dereference — libdoip 3.5 Low2024-11-21
CVE-2024-2550 PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway Using a Specially Crafted Packet — Cloud NGFW 7.5AIHighAI2024-11-14
CVE-2024-2551 PAN-OS: Firewall Denial of Service (DoS) Using a Specially Crafted Packet — Cloud NGFW 7.5AIHighAI2024-11-14
CVE-2024-9472 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Traffic — Cloud NGFW 7.5AIHighAI2024-11-14
CVE-2024-47439 Substance3D - Painter | NULL Pointer Dereference (CWE-476) — Substance3D - Painter 5.5 Medium2024-11-12
CVE-2024-47457 Illustrator | NULL Pointer Dereference (CWE-476) — Illustrator 5.5 Medium2024-11-12
CVE-2024-47458 Bridge | NULL Pointer Dereference (CWE-476) — Bridge 5.5 Medium2024-11-12
CVE-2024-8495 Ivanti Connect Secure 安全漏洞 — Connect Secure 7.5 High2024-11-12
CVE-2024-52296 libosdp has a null pointer deref in osdp_reply_name — libosdp 6.5 Medium2024-11-12
CVE-2024-50318 Ivanti Avalanche 安全漏洞 — Avalanche 7.5 High2024-11-12
CVE-2024-50317 Ivanti Avalanche 安全漏洞 — Avalanche 7.5 High2024-11-12
CVE-2024-47586 NULL Pointer Dereference vulnerability in SAP NetWeaver Application Server for ABAP and ABAP Platform — SAP NetWeaver Application Server for ABAP and ABAP Platform 5.3 Medium2024-11-12
CVE-2024-10750 Tenda i22 SysToo websReadEvent null pointer dereference — i22 6.5 Medium2024-11-04
CVE-2024-20426 Cisco Firepower Threat Defense和Cisco Adaptive Security Appliance 安全漏洞 — Cisco Adaptive Security Appliance (ASA) Software 8.6 High2024-10-23
CVE-2024-20339 Cisco Firepower Threat Defense Software for Firepower 2100 Series TLS Denial of Service Vulnerability — Cisco Firepower Threat Defense Software 8.6 High2024-10-23
CVE-2024-10280 Tenda AC6/AC7/AC8/AC9/AC10/AC10U/AC15/AC18/AC500/AC1206 GetIPTV websReadEvent null pointer dereference — AC6 6.5 Medium2024-10-23
CVE-2024-47459 Substance3D - Sampler | NULL Pointer Dereference (CWE-476) — Substance3D - Sampler 5.5 Medium2024-10-17
CVE-2024-3186 Embedthis Software GoAhead 安全漏洞 — GoAhead 5.3 Medium2024-10-17
CVE-2024-3184 Embedthis Software GoAhead 代码问题漏洞 — GoAhead 5.9 Medium2024-10-17
CVE-2024-47501 Junos OS: MX304, MX with MPC10/11/LC9600, and EX9200 with EX9200-15C: In a VPLS or Junos Fusion scenario specific show commands cause FPCs to crash — Junos OS 5.5 Medium2024-10-11
CVE-2024-47496 Junos OS: MX Series: The PFE will crash on running specific command — Junos OS 5.5 Medium2024-10-11
CVE-2024-6157 ABB IRC5 RobotWare 代码问题漏洞 — RobotWare 6 5.1 Medium2024-10-10
CVE-2024-43559 Windows Mobile Broadband Driver Denial of Service Vulnerability — Windows 10 Version 1809 6.5 Medium2024-10-08
CVE-2024-35215 Blackberry QNX Software Development Platform 安全漏洞 — QNX Software Development Platform (SDP) 6.2 Medium2024-10-08
CVE-2024-43520 Windows Kernel Denial of Service Vulnerability — Windows 10 Version 1809 5.0 Medium2024-10-08
CVE-2024-47007 Ivanti Avalanche 安全漏洞 — Avalanche 7.5 High2024-10-08
CVE-2024-45476 Siemens Tecnomatix Plant Simulation 代码问题漏洞 — Teamcenter Visualization V14.2 3.3 Low2024-10-08

Vulnerabilities classified as CWE-476 (空指针解引用) represent 1138 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.