CWE-124

GPTKB entity

Statements (30)
Predicate Object
gptkbp:instance_of gptkb:Common_Weakness_Enumeration
gptkbp:bfsLayer 6
gptkbp:bfsParent gptkb:CWE-74
gptkbp:difficulty gptkb:High
gptkbp:example Using a pointer that is not properly initialized.
Writing to an array index that is less than zero.
gptkbp:has_weakness CWE-121: Stack-based Buffer Overflow
CWE-122: Heap-based Buffer Overflow
CWE-126: Buffer Over-read
CWE-131: Incorrect Calculation of Buffer Size
CWE-787: Out-of-bounds Write
https://www.w3.org/2000/01/rdf-schema#label CWE-124
gptkbp:impact Data corruption
Denial of service
Security vulnerability
gptkbp:is_described_as A buffer underwrite occurs when a program writes data before the beginning of a buffer.
gptkbp:is_protected_by Bounds checking
Proper initialization of pointers.
Use of safe libraries.
gptkbp:is_vulnerable_to char buffer[10]; buffer[-1] = ' A';
int *ptr = NULL; *ptr = 10;
gptkbp:language gptkb:Java
gptkb:C
gptkb:C++
gptkb:Library
gptkb:C#
gptkbp:name Buffer Underwrite
gptkbp:related_to gptkb:CWE-119
gptkb:CWE-787
gptkb:CWE-20