目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-787 跨界内存写 类漏洞列表 2200

CWE-787 跨界内存写 类弱点 2200 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-787 越界写入是一种严重的内存安全漏洞,指程序向缓冲区边界之外或起始位置之前写入数据。攻击者利用此缺陷可覆盖相邻内存,导致程序崩溃、数据损坏,甚至通过精心构造的 payload 实现任意代码执行,从而完全控制目标系统。开发者应避免此类风险,需严格实施边界检查,使用安全的内存管理函数,启用编译器防护机制,并遵循最小权限原则,确保所有内存访问均在合法范围内。

MITRE CWE 官方描述
CWE:CWE-787 Out-of-bounds Write 英文:The product writes data past the end, or before the beginning, of the intended buffer. 译文:产品将数据写入预期缓冲区(buffer)的末尾之外或起始位置之前。
常见影响 (3)
IntegrityModify Memory, Execute Unauthorized Code or Commands
Write operations could cause memory corruption. In some cases, an adversary can modify control data such as return addresses in order to execute unexpected code.
AvailabilityDoS: Crash, Exit, or Restart
Attempting to access out-of-range, invalid, or unauthorized memory could cause the product to crash.
OtherUnexpected State
Subsequent write operations can produce undefined or unexpected results.
缓解措施 (5)
RequirementsUse a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. For example, many languages that perform their own memory management, such as Java and Perl, are not subject to buffer overflows. Other languages, such as Ada and C#, typically provide overflow protection, but the protection can be disabled by the programmer. Be wary that a lan…
Architecture and DesignUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. Examples include the Safe C String Library (SafeStr) by Messier and Viega [REF-57], and the Strsafe.h library from Microsoft [REF-56]. These libraries provide safer versions of overflow-prone string-handling functions.
Operation, Build and CompilationUse automatic buffer overflow detection mechanisms that are offered by certain compilers or compiler extensions. Examples include: the Microsoft Visual Studio /GS flag, Fedora/Red Hat FORTIFY_SOURCE GCC flag, StackGuard, and ProPolice, which provide various mechanisms including canary-based detection and range/index checking. D3-SFCV (Stack Frame Canary Validation) from D3FEND [REF-1334] discusses…
Effectiveness: Defense in Depth
ImplementationConsider adhering to the following rules when allocating and managing an application's memory: Double check that the buffer is as large as specified. When using functions that accept a number of bytes to copy, such as strncpy(), be aware that if the destination buffer size is equal to the source buffer size, it may not NULL-terminate the string. Check buffer boundaries if accessing the buffer in a…
Operation, Build and CompilationRun or compile the software using features or extensions that randomly arrange the positions of a program's executable and libraries in memory. Because this makes the addresses unpredictable, it can prevent an attacker from reliably jumping to exploitable code. Examples include Address Space Layout Randomization (ASLR) [REF-58] [REF-60] and Position-Independent Executables (PIE) [REF-64]. Imported…
Effectiveness: Defense in Depth
代码示例 (2)
The following code attempts to save four different identification numbers into an array.
int id_sequence[3]; /* Populate the id array. */ id_sequence[0] = 123; id_sequence[1] = 234; id_sequence[2] = 345; id_sequence[3] = 456;
Bad · C
In the following code, it is possible to request that memcpy move a much larger segment of memory than assumed:
int returnChunkSize(void *) { /* if chunk info is valid, return the size of usable memory, * else, return -1 to indicate an error */ ... } int main() { ... memcpy(destBuf, srcBuf, (returnChunkSize(destBuf)-1)); ... }
Bad · C
CVE ID标题CVSS风险等级Published
CVE-2026-4430 AgileEngine 堆缓冲区溢出漏洞 — LibreOffice--2026-05-07
CVE-2026-40003 中兴 ZX297520V3 BootROM USB内存任意写入漏洞 — ZX297520V3 BootROM 5.1 Medium2026-05-07
CVE-2026-0300 PAN-OS User-ID认证门户缓冲区溢出漏洞 — Cloud NGFW--2026-05-06
CVE-2026-7957 Google Chrome (v148.0.7778.96前) 越界写入漏洞 — Chrome--2026-05-06
CVE-2026-7951 Chrome <148.0.7778.96 WebRTC越界写入漏洞 — Chrome--2026-05-06
CVE-2026-7923 Chrome<148.0.7778.96越界写漏洞 — Chrome--2026-05-06
CVE-2026-42370 GeoVision GV-VMS V20 WebCam Server 登录栈溢出漏洞 — GV-VMS V20.0.2 9.0 Critical2026-05-04
CVE-2026-7372 GeoVision GV-VMS V20 WebCam Server 登录栈溢出漏洞 — GV-VMS V20.0.2 9.0 Critical2026-05-04
CVE-2026-42369 GeoVision GV-VMS V20 WebCam Server 栈溢出漏洞 — GV-VMS V20.0.2 10.0 Critical2026-05-04
CVE-2026-7582 OpenImageIO DDS模块越界写入漏洞 — OpenImageIO 5.3 Medium2026-05-01
CVE-2026-7426 FreeRTOS-Plus-TCP 缓冲区错误漏洞 — FreeRTOS-Plus-TCP 8.1 High2026-04-29
CVE-2026-41220 Acronis Cyber Protect Cloud Agent和Acronis DeviceLock DLP 缓冲区错误漏洞 — Acronis DeviceLock DLP 7.8AIHighAI2026-04-29
CVE-2026-5435 GNU C Library 缓冲区错误漏洞 — glibc 9.8AICriticalAI2026-04-28
CVE-2026-41678 rust-openssl 缓冲区错误漏洞 — rust-openssl 9.1AICriticalAI2026-04-24
CVE-2026-41676 rust-openssl 安全漏洞 — rust-openssl 5.9AIMediumAI2026-04-24
CVE-2026-41990 Libgcrypt 缓冲区错误漏洞 — Libgcrypt 4.0 Medium2026-04-23
CVE-2026-41989 Libgcrypt 缓冲区错误漏洞 — Libgcrypt 6.7 Medium2026-04-23
CVE-2018-25271 Textpad 缓冲区错误漏洞 — Textpad 6.2 Medium2026-04-22
CVE-2018-25268 LizardSystems LanSpy 缓冲区错误漏洞 — LanSpy 8.4 High2026-04-22
CVE-2018-25267 EZB Systems UltraISO 缓冲区错误漏洞 — UltraISO 6.2 Medium2026-04-22
CVE-2018-25266 Angry IP Scanner 缓冲区错误漏洞 — Angry IP Scanner 6.2 Medium2026-04-22
CVE-2018-25265 LizardSystems LanSpy 缓冲区错误漏洞 — LanSpy 8.4 High2026-04-22
CVE-2018-25262 Angry IP Scanner 缓冲区错误漏洞 — Angry IP Scanner for Linux 6.2 Medium2026-04-22
CVE-2018-25261 Iperius Backup 缓冲区错误漏洞 — Iperius Backup 8.4 High2026-04-22
CVE-2018-25260 MAGIX Music Editor 缓冲区错误漏洞 — MAGIX Music Editor 8.4 High2026-04-22
CVE-2026-3298 CPython 安全漏洞 — CPython 8.8AIHighAI2026-04-21
CVE-2026-40494 SAIL 安全漏洞 — sail 9.8 Critical2026-04-18
CVE-2026-40493 SAIL 安全漏洞 — sail 9.8 Critical2026-04-18
CVE-2026-40492 SAIL 安全漏洞 — sail 9.8 Critical2026-04-18
CVE-2026-6507 DNSmasq 安全漏洞 — Red Hat Enterprise Linux 10 7.5 High2026-04-17

CWE-787(跨界内存写) 是常见的弱点类别,本平台收录该类弱点关联的 2200 条 CVE 漏洞。