[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Buffer Over-read

ID: 126Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: DRAFT
Abstraction Type: Variant





Description

The software reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.

Extended Description

This typically occurs when the pointer or its index is incremented to a position beyond the bounds of the buffer or when pointer arithmetic results in a position outside of the valid memory location to name a few. This may result in exposure of sensitive information or possibly a crash.

Applicable Platforms
Language: C
Language: C++

Time Of Introduction

  • Implementation

Common Consequences

ScopeTechnical ImpactNotes
Confidentiality
 
Read memory
 
 

Detection Methods
None

Potential Mitigations
None

Relationships
These problems may be resultant from missing sentinel values (CWE-463) or trusting a user-influenced input length variable.

Related CWETypeViewChain
CWE-126 ChildOf CWE-890 Category CWE-888  

Demonstrative Examples   (Details)

  1. In the following C/C++ example the method processMessageFromSocket() will get a message from a socket, placed into a buffer, and will parse the contents of the buffer into a structure that contains the message length and the message body. A for loop is used to copy the message body into a local character string which will be passed to another method for processing. (Demonstrative Example Id DX-91)

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
PLOVER  Buffer over-read
 
 

References:
None

CVE    10
CVE-2021-1373
CVE-2021-34302
CVE-2021-34299
CVE-2021-34321
...

© SecPod Technologies