CWE-805 - Buffer Access with Incorrect Length Value
CWE-805 High
- Abstraction:
- Base
- Structure:
- Simple
- Status:
- Incomplete
- Weakness Name
Buffer Access with Incorrect Length Value
- Description
The product uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer.
When the length value exceeds the size of the destination, a buffer overflow could occur.
- Common Consequences
Scope: Integrity, Confidentiality, Availability
Impact: Read Memory, Modify Memory, Execute Unauthorized Code or Commands
Notes: Buffer overflows often can be used to execute arbitrary code, which is usually outside the scope of a program's implicit security policy. This can often be used to subvert any other security service.
Scope: Availability
Impact: Modify Memory, DoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU)
Notes: Buffer overflows generally lead to crashes. Other attacks leading to lack of availability are possible, including putting the program into an infinite loop.
- Related Weaknesses
- Release Date:
- 2010-02-16
- Latest Modification Date:
- 2024-02-29
Free security scan for your website