1 vulnerabilities classified as CWE-587 (将一个固定地址复制给指针). AI Chinese analysis included.
CWE-587 represents a critical programming weakness where developers explicitly assign a fixed memory address to a pointer, bypassing standard dynamic allocation mechanisms. This practice severely compromises portability, as specific memory locations are rarely valid across different operating systems, hardware architectures, or runtime environments. Exploitation typically occurs when an attacker leverages this hardcoded reference to overwrite critical data structures or execute arbitrary code, particularly if the fixed address falls within a predictable or accessible memory region. To mitigate this risk, developers must avoid hardcoding addresses entirely. Instead, they should utilize dynamic memory allocation functions like malloc or rely on language-specific abstractions that manage memory safely. By ensuring pointers reference valid, dynamically assigned memory, applications maintain robustness and compatibility across diverse platforms, eliminating the vulnerabilities associated with static memory assumptions.
int (*pt2Function) (float, char, char)=0x08040000; int result2 = (*pt2Function) (12, 'a', 'b'); // Here we can inject code to execute.| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2021-28216 | Tianocore Edk2 安全漏洞 — EDK II | 7.7 | - | 2021-08-05 |
Vulnerabilities classified as CWE-587 (将一个固定地址复制给指针) represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.