Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-843 (使用不兼容类型访问资源(类型混淆)) — Vulnerability Class 348

348 vulnerabilities classified as CWE-843 (使用不兼容类型访问资源(类型混淆)). AI Chinese analysis included.

CWE-843, Type Confusion, is a critical memory safety weakness where a resource is initialized with one data type but subsequently accessed using an incompatible type. This discrepancy often triggers logical errors or undefined behavior, particularly in memory-unsafe languages like C and C++, where the program misinterprets the underlying bit patterns. Attackers typically exploit this vulnerability by crafting malicious inputs that force the application to treat a pointer or object as a different type, potentially leading to arbitrary code execution, data corruption, or denial of service. To mitigate this risk, developers must enforce strict type checking and validation at runtime. Utilizing memory-safe programming languages, implementing comprehensive unit tests for type assertions, and employing static analysis tools can effectively detect these mismatches before deployment, ensuring that resources are always accessed according to their intended definitions.

MITRE CWE Description
The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type. When the product accesses the resource using an incompatible type, this could trigger logical errors because the resource does not have expected properties. In languages without memory safety, such as C and C++, type confusion can lead to out-of-bounds memory access. While this weakness is frequently associated with unions when parsing data with many different embedded object types in C, it can be present in any application that can interpret the same variable or memory location in multiple ways. This weakness is not unique to C and C++. For example, errors in PHP applications can be triggered by providing array parameters when scalars are expected, or vice versa. Languages such as Perl, which perform automatic conversion of a variable of one type when it is accessed as if it were another type, can also contain these issues.
Common Consequences (1)
Availability, Integrity, ConfidentialityRead Memory, Modify Memory, Execute Unauthorized Code or Commands, DoS: Crash, Exit, or Restart
When a memory buffer is accessed using the wrong type, it could read or write memory out of the bounds of the buffer, if the allocated buffer is smaller than the type that the code is attempting to access, leading to a crash and possibly code execution.
Examples (2)
The following code uses a union to support the representation of different types of messages. It formats messages differently, depending on their type.
#define NAME_TYPE 1 #define ID_TYPE 2 struct MessageBuffer { int msgType; union { char *name; int nameID; }; }; int main (int argc, char **argv) { struct MessageBuffer buf; char *defaultMessage = "Hello World"; buf.msgType = NAME_TYPE; buf.name = defaultMessage; printf("Pointer of buf.name is %p\n", buf.name); /* This particular value for nameID is used to make the code architecture-independent. If coming from untrusted input, it could be any value. */ buf.nameID = (int)(defaultMessage + 1); printf("Pointer of buf.name is now %p\n", buf.name); if (buf.msgType == NAME_TYPE) { printf("Message: %
Bad · C
The following PHP code accepts a value, adds 5, and prints the sum.
$value = $_GET['value']; $sum = $value + 5; echo "value parameter is '$value'<p>"; echo "SUM is $sum";
Bad · PHP
CVE IDTitleCVSSSeverityPublished
CVE-2020-10912 Foxit Reader和PhantomPDF 安全漏洞 — PhantomPDF 7.8 -2020-04-22
CVE-2020-10908 Foxit Reader和PhantomPDF 安全漏洞 — PhantomPDF 7.8 -2020-04-22
CVE-2020-10909 Foxit Reader和PhantomPDF 安全漏洞 — PhantomPDF 7.8 -2020-04-22
CVE-2020-10910 Foxit Reader和PhantomPDF 安全漏洞 — PhantomPDF 7.8 -2020-04-22
CVE-2020-10891 Foxit Reader和PhantomPDF 安全漏洞 — PhantomPDF 7.8 -2020-04-22
CVE-2020-10889 Foxit Reader和PhantomPDF 安全漏洞 — PhantomPDF 7.8 -2020-04-22
CVE-2020-10611 Triangle MicroWorks SCADA Data Gateway 安全漏洞 — Triangle MicroWorks SCADA Data Gateway 3.02.0697 through 4.0.122, 2.41.0213 through 4.0.122 9.8 -2020-04-15
CVE-2019-13519 Rockwell Automation Arena Simulation Software 安全漏洞 — Rockwell Automation Arena Simulation Software 7.8 -2020-01-27
CVE-2019-13329 Foxit Reader 安全漏洞 — Reader 7.8 -2019-10-03
CVE-2019-13330 Foxit Reader 安全漏洞 — Reader 7.8 -2019-10-03
CVE-2019-10980 LCDS LAquis SCADA 代码问题漏洞 — LCDS LAquis SCADA 7.8 -2019-08-05
CVE-2019-6532 Panasonic FPWIN Pro 代码问题漏洞 — FPWIN Pro 7.8 -2019-06-07
CVE-2018-19027 Omron CX-One CX-Protocol 安全漏洞 — CX-Protocol within CX-One 7.8 -2019-01-30
CVE-2018-17685 Foxit Reader和Foxit PhantomPDF for Windows 安全漏洞 — Reader 8.8 -2019-01-24
CVE-2018-19019 OmronCX-Supervisor 安全漏洞 — CX-Supervisor 7.3 -2019-01-22
CVE-2018-14317 Foxit Reader 安全漏洞 — Foxit Reader 8.8 -2018-08-30
CVE-2018-11623 Foxit Reader和PhantomPDF 安全漏洞 — Foxit Reader 8.8 -2018-07-31
CVE-2018-14241 Foxit Reader和PhantomPDF 安全漏洞 — Foxit Reader 8.8 -2018-07-31
CVE-2018-14242 Foxit Reader和PhantomPDF 安全漏洞 — Foxit Reader 8.8 -2018-07-31
CVE-2018-14243 Foxit Reader和PhantomPDF 安全漏洞 — Foxit Reader 8.8 -2018-07-31
CVE-2018-14244 Foxit Reader和PhantomPDF 安全漏洞 — Foxit Reader 8.8 -2018-07-31
CVE-2018-14245 Foxit Reader和PhantomPDF 安全漏洞 — Foxit Reader 8.8 -2018-07-31
CVE-2018-14246 Foxit Reader和PhantomPDF 安全漏洞 — Foxit Reader 8.8 -2018-07-31
CVE-2018-14247 Foxit Reader和PhantomPDF 安全漏洞 — Foxit Reader 8.8 -2018-07-31
CVE-2018-14248 Foxit Reader和PhantomPDF 安全漏洞 — Foxit Reader 8.8 -2018-07-31
CVE-2018-14249 Foxit Reader和PhantomPDF 安全漏洞 — Foxit Reader 8.8 -2018-07-31
CVE-2018-14250 Foxit Reader和PhantomPDF 安全漏洞 — Foxit Reader 8.8 -2018-07-31
CVE-2018-14251 Foxit Reader和PhantomPDF 安全漏洞 — Foxit Reader 8.8 -2018-07-31
CVE-2018-14252 Foxit Reader和PhantomPDF 安全漏洞 — Foxit Reader 8.8 -2018-07-31
CVE-2018-14253 Foxit Reader和PhantomPDF 安全漏洞 — Foxit Reader 8.8 -2018-07-31

Vulnerabilities classified as CWE-843 (使用不兼容类型访问资源(类型混淆)) represent 348 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.