Statements (46)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:CEO
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:CWE-74
|
gptkbp:category |
Buffer Errors
|
gptkbp:difficulty |
gptkb:High
|
gptkbp:example |
Improperly calculating buffer sizes.
Using uninitialized pointers. Writing more data to a buffer than it can hold. |
gptkbp:has_weakness |
gptkb:CWE-121
gptkb:CWE-129 gptkb:CWE-131 gptkb:CWE-134 gptkb:CWE-190 gptkb:CWE-191 gptkb:CWE-787 gptkb:CWE-125 gptkb:CWE-20 CWE-170 CWE-798 CWE-204 CWE-253 CWE-788 CWE-789 CWE-790 CWE-791 CWE-792 CWE-793 CWE-794 CWE-795 CWE-796 CWE-797 CWE-799 |
https://www.w3.org/2000/01/rdf-schema#label |
CWE-122
|
gptkbp:impact |
Can lead to data corruption.
Can lead to arbitrary code execution. Can lead to denial of service. |
gptkbp:is_described_as |
A buffer overflow that occurs when data is written to a heap-allocated buffer and exceeds its allocated size.
|
gptkbp:is_often_used_in |
C programming language.
C++ programming language. Assembly language. |
gptkbp:is_protected_by |
Implement proper memory management.
Use languages with automatic memory management. Use safe functions that check buffer sizes. |
gptkbp:name |
Heap-based Buffer Overflow
|
gptkbp:related_to |
gptkb:CWE-119
gptkb:CWE-787 |