Description
The product writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer.
Potential Impact
Integrity, Availability
Modify Memory, DoS: Crash, Exit, or Restart
Integrity, Confidentiality, Availability, Access Control, Other
Execute Unauthorized Code or Commands, Modify Memory, Bypass Protection Mechanism, Other
Access Control, Other
Bypass Protection Mechanism, Other
Demonstrative Examples
char* trimTrailingWhitespace(char *strMessage, int length) {
char *retMessage;char *message = malloc(sizeof(char)*(length+1));
// copy input string to a temporary string
char message[length+1];int index;for (index = 0; index < length; index++) {message[index] = strMessage[index];}message[index] = '\0';
// trim trailing whitespace
int len = index-1;while (isspace(message[len])) {message[len] = '\0';len--;}
// return string without trailing whitespace
retMessage = message;return retMessage;
}int main() {
...
char *result = strstr(destBuf, "Replace Me");
int idx = result - destBuf;
strcpy(&destBuf[idx], srcBuf);
...}Mitigations & Prevention
Choose a language that is not susceptible to these issues.
All calculated values that are used as index or for pointer arithmetic should be validated to ensure that they are within an expected range.
Detection Methods
- Automated Static Analysis High — Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then sea
- Automated Dynamic Analysis Moderate — Use tools that are integrated during compilation to insert runtime error-checking mechanisms related to memory safety errors, such as AddressSanitizer (ASan) for C/C++ [REF-1518].
Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2021-24018 | buffer underwrite in firmware verification routine allows code execution via a crafted firmware image |
| CVE-2002-2227 | Unchecked length of SSLv2 challenge value leads to buffer underflow. |
| CVE-2007-4580 | Buffer underflow from a small size value with a large buffer (length parameter inconsistency, CWE-130) |
| CVE-2007-1584 | Buffer underflow from an all-whitespace string, which causes a counter to be decremented before the buffer while looking for a non-whitespace character. |
| CVE-2007-0886 | Buffer underflow resultant from encoded data that triggers an integer overflow. |
| CVE-2006-6171 | Product sets an incorrect buffer size limit, leading to "off-by-two" buffer underflow. |
| CVE-2006-4024 | Negative value is used in a memcpy() operation, leading to buffer underflow. |
| CVE-2004-2620 | Buffer underflow due to mishandled special characters |
Related Weaknesses
Taxonomy Mappings
- PLOVER: — UNDER - Boundary beginning violation ('buffer underflow'?)
- CLASP: — Buffer underwrite
- Software Fault Patterns: SFP8 — Faulty Buffer Access
Frequently Asked Questions
What is CWE-124?
CWE-124 (Buffer Underwrite ('Buffer Underflow')) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer.
How can CWE-124 be exploited?
Attackers can exploit CWE-124 (Buffer Underwrite ('Buffer Underflow')) to modify memory, dos: crash, exit, or restart. This weakness is typically introduced during the Implementation phase of software development.
How do I prevent CWE-124?
Key mitigations include: Choose a language that is not susceptible to these issues.
What is the severity of CWE-124?
CWE-124 is classified as a Base-level weakness (Medium abstraction). It has been observed in 8 real-world CVEs.