Portée | Impact | Probabilité |
---|---|---|
Confidentiality | Read Memory Note: An attacker could get secret values such as cryptographic keys, PII, memory addresses, or other information that could be used in additional attacks. | |
Confidentiality | Bypass Protection Mechanism Note: Out-of-bounds memory could contain memory addresses or other information that can be used to bypass ASLR and other protection mechanisms in order to improve the reliability of exploiting a separate weakness for code execution. | |
Availability | DoS: Crash, Exit, or Restart Note: An attacker could cause a segmentation fault or crash by causing memory to be read outside of the bounds of the buffer. This is especially likely when the code reads a variable amount of data and assumes that a sentinel exists to stop the read operation, such as a NUL in a string. | |
Other | Varies by Context Note: The read operation could produce other undefined or unexpected results. |
Références | Description |
---|---|
CVE-2023-1018 | The reference implementation code for a Trusted Platform Module does not implement length checks on data, allowing for an attacker to read 2 bytes past the end of a buffer. |
CVE-2020-11899 | Out-of-bounds read in IP stack used in embedded systems, as exploited in the wild per CISA KEV. |
CVE-2014-0160 | Chain: "Heartbleed" bug receives an inconsistent length parameter (CWE-130) enabling an out-of-bounds read (CWE-126), returning memory that could include private cryptographic keys and other sensitive data. |
CVE-2021-40985 | HTML conversion package has a buffer under-read, allowing a crash |
CVE-2018-10887 | Chain: unexpected sign extension (CWE-194) leads to integer overflow (CWE-190), causing an out-of-bounds read (CWE-125) |
CVE-2009-2523 | Chain: product does not handle when an input string is not NULL terminated (CWE-170), leading to buffer over-read (CWE-125) or heap-based buffer overflow (CWE-122). |
CVE-2018-16069 | Chain: series of floating-point precision errors (CWE-1339) in a web browser rendering engine causes out-of-bounds read (CWE-125), giving access to cross-origin data |
CVE-2004-0112 | out-of-bounds read due to improper length check |
CVE-2004-0183 | packet with large number of specified elements cause out-of-bounds read. |
CVE-2004-0221 | packet with large number of specified elements cause out-of-bounds read. |
CVE-2004-0184 | out-of-bounds read, resultant from integer underflow |
CVE-2004-1940 | large length value causes out-of-bounds read |
CVE-2004-0421 | malformed image causes out-of-bounds read |
CVE-2008-4113 | OS kernel trusts userland-supplied length value, allowing reading of sensitive information |
Assume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does.
When performing input validation, consider all potentially relevant properties, including length, type of input, the full range of acceptable values, missing or extra inputs, syntax, consistency across related fields, and conformance to business rules. As an example of business rule logic, "boat" may be syntactically valid because it only contains alphanumeric characters, but it is not valid if the input is only expected to contain colors such as "red" or "blue."
Do not rely exclusively on looking for malicious or malformed inputs. This is likely to miss at least one undesirable input, especially if the code's environment changes. This can give attackers enough room to bypass the intended validation. However, denylists can be useful for detecting potential attacks or determining which inputs are so malformed that they should be rejected outright.
To reduce the likelihood of introducing an out-of-bounds read, ensure that you validate and ensure correct calculations for any length argument, buffer size calculation, or offset. Be especially careful of relying on a sentinel (i.e. special character such as NUL) in untrusted inputs.
CAPEC-ID | Nom du modèle d'attaque |
---|---|
CAPEC-540 | Overread Buffers An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution. |
Nom | Organisation | Date | Date de publication | Version |
---|---|---|---|---|
PLOVER | Draft 3 |
Nom | Organisation | Date | Commentaire |
---|---|---|---|
CWE Content Team | MITRE | updated Applicable_Platforms, Relationships, Taxonomy_Mappings, Weakness_Ordinalities | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Demonstrative_Examples, References, Relationships | |
CWE Content Team | MITRE | updated Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Causal_Nature, Observed_Examples, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Description, Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Common_Consequences, Observed_Examples, Potential_Mitigations, References, Relationships | |
CWE Content Team | MITRE | updated Potential_Mitigations, Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Observed_Examples, Potential_Mitigations | |
CWE Content Team | MITRE | updated Observed_Examples, Potential_Mitigations, Relationships | |
CWE Content Team | MITRE | updated Related_Attack_Patterns, Relationships | |
CWE Content Team | MITRE | updated Observed_Examples, Relationships | |
CWE Content Team | MITRE | updated Research_Gaps | |
CWE Content Team | MITRE | updated Observed_Examples, Relationships | |
CWE Content Team | MITRE | updated Applicable_Platforms, Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated Detection_Factors, References, Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes, Relationships | |
CWE Content Team | MITRE | updated Observed_Examples | |
CWE Content Team | MITRE | updated Alternate_Terms, Common_Consequences, Description, Diagram, Weakness_Ordinalities | |
CWE Content Team | MITRE | updated Observed_Examples, Relationships |