CWE-122

GPTKB entity

Statements (46)
Predicate Object
gptkbp:instance_of gptkb:CEO
gptkbp:bfsLayer 6
gptkbp:bfsParent gptkb:CWE-74
gptkbp:category Buffer Errors
gptkbp:difficulty gptkb:High
gptkbp:example Improperly calculating buffer sizes.
Using uninitialized pointers.
Writing more data to a buffer than it can hold.
gptkbp:has_weakness gptkb:CWE-121
gptkb:CWE-129
gptkb:CWE-131
gptkb:CWE-134
gptkb:CWE-190
gptkb:CWE-191
gptkb:CWE-787
gptkb:CWE-125
gptkb:CWE-20
CWE-170
CWE-798
CWE-204
CWE-253
CWE-788
CWE-789
CWE-790
CWE-791
CWE-792
CWE-793
CWE-794
CWE-795
CWE-796
CWE-797
CWE-799
https://www.w3.org/2000/01/rdf-schema#label CWE-122
gptkbp:impact Can lead to data corruption.
Can lead to arbitrary code execution.
Can lead to denial of service.
gptkbp:is_described_as A buffer overflow that occurs when data is written to a heap-allocated buffer and exceeds its allocated size.
gptkbp:is_often_used_in C programming language.
C++ programming language.
Assembly language.
gptkbp:is_protected_by Implement proper memory management.
Use languages with automatic memory management.
Use safe functions that check buffer sizes.
gptkbp:name Heap-based Buffer Overflow
gptkbp:related_to gptkb:CWE-119
gptkb:CWE-787