Base · Medium

CWE-190: Integer Overflow or Wraparound

The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original...

CWE-190 · Base Level ·19 CVEs ·7 Mitigations

Description

The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.

Potential Impact

Availability

DoS: Crash, Exit, or Restart, DoS: Resource Consumption (Memory), DoS: Instability

Integrity

Modify Memory

Confidentiality, Availability, Access Control

Execute Unauthorized Code or Commands, Bypass Protection Mechanism

Availability, Other

Alter Execution Logic, DoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU)

Access Control

Bypass Protection Mechanism

Demonstrative Examples

The following image processing code allocates a table for images.
Bad
img_t table_ptr; /*struct containing img data, 10kB each*/int num_imgs;...num_imgs = get_num_imgs();table_ptr = (img_t*)malloc(sizeof(img_t)*num_imgs);...
This code intends to allocate a table of size num_imgs, however as num_imgs grows large, the calculation determining the size of the list will eventually overflow (CWE-190). This will result in a very small list to be allocated instead. If the subsequent code operates on the list as if it were num_imgs long, it may result in many types of out-of-bounds problems (CWE-119).
The following code excerpt from OpenSSH 3.3 demonstrates a classic case of integer overflow:
Bad
nresp = packet_get_int();if (nresp > 0) {response = xmalloc(nresp*sizeof(char*));for (i = 0; i < nresp; i++) response[i] = packet_get_string(NULL);}
If nresp has the value 1073741824 and sizeof(char*) has its typical value of 4, then the result of the operation nresp*sizeof(char*) overflows, and the argument to xmalloc() will be 0. Most malloc() implementations will happily allocate a 0-byte buffer, causing the subsequent loop iterations to overflow the heap buffer response.
Integer overflows can be complicated and difficult to detect. The following example is an attempt to show how an integer overflow may lead to undefined looping behavior:
Bad
short int bytesRec = 0;char buf[SOMEBIGNUM];
                     while(bytesRec < MAXGET) {bytesRec += getFromInput(buf+bytesRec);}
In the above case, it is entirely possible that bytesRec may overflow, continuously creating a lower number than MAXGET and also overwriting the first MAXGET-1 bytes of buf.
In this example the method determineFirstQuarterRevenue is used to determine the first quarter revenue for an accounting/business application. The method retrieves the monthly sales totals for the first three months of the year, calculates the first quarter sales totals from the monthly sales totals, calculates the first quarter revenue based on the first quarter sales, and finally saves the first quarter revenue results to the database.
Bad
#define JAN 1#define FEB 2#define MAR 3
                     short getMonthlySales(int month) {...}
                     float calculateRevenueForQuarter(short quarterSold) {...}
                     int determineFirstQuarterRevenue() {
                        
                           
                           // Variable for sales revenue for the quarter
                           float quarterRevenue = 0.0f;
                           short JanSold = getMonthlySales(JAN); /* Get sales in January */short FebSold = getMonthlySales(FEB); /* Get sales in February */short MarSold = getMonthlySales(MAR); /* Get sales in March */
                           
                           // Calculate quarterly total
                           short quarterSold = JanSold + FebSold + MarSold;
                           
                           // Calculate the total revenue for the quarter
                           quarterRevenue = calculateRevenueForQuarter(quarterSold);
                           saveFirstQuarterRevenue(quarterRevenue);
                           return 0;
                     }
However, in this example the primitive type short int is used for both the monthly and the quarterly sales variables. In C the short int primitive type has a maximum value of 32768. This creates a potential integer overflow if the value for the three monthly sales adds up to more than the maximum value for the short int primitive type. An integer overflow can lead to data corruption, unexpected behavior, infinite loops and system crashes. To correct the situation the appropriate primitive type should be used, as in the example below, and/or provide some validation mechanism to ensure that the maximum value for the primitive type is not exceeded.
Good
...float calculateRevenueForQuarter(long quarterSold) {...}
                     int determineFirstQuarterRevenue() {
                        ...
                           // Calculate quarterly total
                           long quarterSold = JanSold + FebSold + MarSold;
                           
                           // Calculate the total revenue for the quarter
                           quarterRevenue = calculateRevenueForQuarter(quarterSold);
                           ...
                     }
Note that an integer overflow could also occur if the quarterSold variable has a primitive type long but the method calculateRevenueForQuarter has a parameter of type short.

Mitigations & Prevention

Requirements

Ensure that all protocols are strictly defined, such that all out-of-bounds behavior can be identified simply, and require strict conformance to the protocol.

Requirements

Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. If possible, choose a language or compiler that performs automatic bounds checking.

Architecture and Design

Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482]. Use libraries or frameworks that make it easier to handle numbers without unexpected consequences. Examples include safe integer handling packages such as SafeInt (C++) or IntegerLib (C or C++). [REF-106]

Implementation

Perform input validation on any numeric input by ensuring that it is within the expected range. Enforce that the input meets both the minimum and maximum requirements for the expected range. Use unsigned integers where possible. This makes it easier to perform validation for integer overflows. When signed integers are required, ensure that the range check includes minimum values as well as maximum values.

Implementation

Understand the programming language's underlying representation and how it interacts with numeric calculation (CWE-681). Pay close attention to byte size discrepancies, precision, signed/unsigned distinctions, truncation, conversion and casting between types, "not-a-number" calculations, and how the language handles numbers that are too large or too small for its underlying representation. [REF-7] Also be careful to account for 32-bit, 64-bit, and other potential differences

Architecture and Design

For any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server.

Implementation

Examine compiler warnings closely and eliminate problems with potential security implications, such as signed / unsigned mismatch in memory operations, or use of uninitialized variables. Even if the weakness is rarely exploitable, a single failure may lead to the compromise of the entire system.

Detection Methods

  • Automated Static Analysis High — This weakness can often be detected using automated static analysis tools. Many modern tools use data flow analysis or constraint-based techniques to minimize the number of false positives.
  • Black Box Moderate — Sometimes, evidence of this weakness can be detected using dynamic tools and techniques that interact with the product using large test suites with many diverse inputs, such as fuzz testing (fuzzing), robustness testing, and fault injection. The product's operation may slow down, but it should not b
  • Manual Analysis High — This weakness can be detected using tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session. Specifically, manual static analysis is useful for eval
  • Automated Static Analysis - Binary or Bytecode High — According to SOAR [REF-1479], the following detection techniques may be useful:
  • Dynamic Analysis with Manual Results Interpretation SOAR Partial — According to SOAR [REF-1479], the following detection techniques may be useful:
  • Manual Static Analysis - Source Code SOAR Partial — According to SOAR [REF-1479], the following detection techniques may be useful:

Real-World CVE Examples

CVE IDDescription
CVE-2025-46687Chain: Javascript engine code does not perform a length check (CWE-1284) leading to integer overflow (CWE-190) causing allocation of smaller buffer than expected (CWE-131) resulting in a heap-based bu
CVE-2025-27363Font rendering library does not properly handle assigning a signed short value to an unsigned long (CWE-195), leading to an integer wraparound (CWE-190), c
CVE-2021-43537Chain: in a web browser, an unsigned 64-bit integer is forcibly cast to a 32-bit integer (CWE-681) and potentially leading to an integer overflow (CWE-190). If an integer overflow occurs, this can cau
CVE-2019-19911Chain: Python library does not limit the resources used to process images that specify a very large number of bands (CWE-1284), leading to excessive memory consumption (CWE-789) or an integer overflow
CVE-2022-0545Chain: 3D renderer has an integer overflow (CWE-190) leading to write-what-where condition (CWE-123) using a crafted image.
CVE-2021-30860Chain: improper input validation (CWE-20) leads to integer overflow (CWE-190) in mobile OS, as exploited in the wild per CISA KEV.
CVE-2021-30663Chain: improper input validation (CWE-20) leads to integer overflow (CWE-190) in mobile OS, as exploited in the wild per CISA KEV.
CVE-2018-10887Chain: unexpected sign extension (CWE-194) leads to integer overflow (CWE-190), causing an out-of-bounds read (CWE-125)
CVE-2019-1010006Chain: compiler optimization (CWE-733) removes or modifies code used to detect integer overflow (CWE-190), allowing out-of-bounds write (CWE-787).
CVE-2010-1866Chain: integer overflow (CWE-190) causes a negative signed value, which later bypasses a maximum-only check (CWE-839), leading to heap-based buffer overflow (CWE-122).
CVE-2010-2753Chain: integer overflow leads to use-after-free
CVE-2005-1513Chain: integer overflow in securely-coded mail program leads to buffer overflow. In 2005, this was regarded as unrealistic to exploit, but in 2020, it was rediscovered to be easier to exploit due to e
CVE-2002-0391Integer overflow via a large number of arguments.
CVE-2002-0639Integer overflow in OpenSSH as listed in the demonstrative examples.
CVE-2005-1141Image with large width and height leads to integer overflow.

Showing 15 of 19 observed examples.

Taxonomy Mappings

  • PLOVER: — Integer overflow (wrap or wraparound)
  • 7 Pernicious Kingdoms: — Integer Overflow
  • CLASP: — Integer overflow
  • CERT C Secure Coding: INT18-C — Evaluate integer expressions in a larger size before comparing or assigning to that size
  • CERT C Secure Coding: INT30-C — Ensure that unsigned integer operations do not wrap
  • CERT C Secure Coding: INT32-C — Ensure that operations on signed integers do not result in overflow
  • CERT C Secure Coding: INT35-C — Evaluate integer expressions in a larger size before comparing or assigning to that size
  • CERT C Secure Coding: MEM07-C — Ensure that the arguments to calloc(), when multiplied, do not wrap
  • CERT C Secure Coding: MEM35-C — Allocate sufficient memory for an object
  • WASC: 3 — Integer Overflows
  • Software Fault Patterns: SFP1 — Glitch in computation
  • ISA/IEC 62443: Part 3-3 — Req SR 3.5
  • ISA/IEC 62443: Part 3-3 — Req SR 7.2
  • ISA/IEC 62443: Part 4-1 — Req SR-2
  • ISA/IEC 62443: Part 4-1 — Req SI-2
  • ISA/IEC 62443: Part 4-1 — Req SVV-1
  • ISA/IEC 62443: Part 4-1 — Req SVV-3
  • ISA/IEC 62443: Part 4-2 — Req CR 3.5
  • ISA/IEC 62443: Part 4-2 — Req CR 7.2

Frequently Asked Questions

What is CWE-190?

CWE-190 (Integer Overflow or Wraparound) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original...

How can CWE-190 be exploited?

Attackers can exploit CWE-190 (Integer Overflow or Wraparound) to dos: crash, exit, or restart, dos: resource consumption (memory), dos: instability. This weakness is typically introduced during the Implementation phase of software development.

How do I prevent CWE-190?

Key mitigations include: Ensure that all protocols are strictly defined, such that all out-of-bounds behavior can be identified simply, and require strict conformance to the protocol.

What is the severity of CWE-190?

CWE-190 is classified as a Base-level weakness (Medium abstraction). It has been observed in 19 real-world CVEs.