Description
The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
This can have security implications when the associated resource is expected to have certain properties or values, such as a variable that determines whether a user has been authenticated or not.
Potential Impact
Confidentiality
Read Memory, Read Application Data
Access Control
Bypass Protection Mechanism
Availability
DoS: Crash, Exit, or Restart
Demonstrative Examples
private boolean initialized = true;public void someMethod() {
if (!initialized) {
// perform initialization tasks
...
initialized = true;
}$username = GetCurrentUser();$state = GetStateData($username);if (defined($state)) {$uid = ExtractUserID($state);}
# do stuff
if ($uid == 0) {DoAdminThings();}char str[20];strcat(str, "hello world");printf("%s", str);Mitigations & Prevention
Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. For example, in Java, if the programmer does not explicitly initialize a variable, then the code could produce a compile-time error (if the variable is local) or automatically initialize the variable to the default value for the variable's type. In Perl, if explicit initialization is not performed, then a default value of undef is assigned, which is interp
Identify all variables and data stores that receive information from external sources, and apply input validation to make sure that they are only initialized to expected values.
Explicitly initialize all your variables and other data stores, either during declaration or just before the first usage.
Pay close attention to complex conditionals that affect initialization, since some conditions might not perform the initialization.
Avoid race conditions (CWE-362) during initialization routines.
Run or compile your product with settings that generate warnings about uninitialized variables or data.
Detection Methods
- Automated Dynamic Analysis Moderate — This weakness can be detected using dynamic tools and techniques that interact with the software using large test suites with many diverse inputs, such as fuzz testing (fuzzing), robustness testing, and fault injection. The software's operation may slow down, but it should not become unstable, crash
- Manual Dynamic Analysis — Identify error conditions that are not likely to occur during normal usage and trigger them. For example, run the program under low memory conditions, run with insufficient privileges or permissions, interrupt a transaction before it is completed, or disable connectivity to basic network services su
- Automated Static Analysis High — Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then sea
Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2001-1471 | chain: an invalid value prevents a library file from being included, skipping initialization of key variables, leading to resultant eval injection. |
| CVE-2008-3637 | Improper error checking in protection mechanism produces an uninitialized variable, allowing security bypass and code execution. |
| CVE-2008-4197 | Use of uninitialized memory may allow code execution. |
| CVE-2008-2934 | Free of an uninitialized pointer leads to crash and possible code execution. |
| CVE-2007-3749 | OS kernel does not reset a port when starting a setuid program, allowing local users to access the port and gain privileges. |
| CVE-2008-0063 | Product does not clear memory contents when generating an error message, leading to information leak. |
| CVE-2008-0062 | Lack of initialization triggers NULL pointer dereference or double-free. |
| CVE-2008-0081 | Uninitialized variable leads to code execution in popular desktop application. |
| CVE-2008-3688 | chain: Uninitialized variable leads to infinite loop. |
| CVE-2008-3475 | chain: Improper initialization leads to memory corruption. |
| CVE-2008-5021 | Composite: race condition allows attacker to modify an object while it is still being initialized, causing software to access uninitialized memory. |
| CVE-2005-1036 | Chain: Bypass of access restrictions due to improper authorization (CWE-862) of a user results from an improperly initialized (CWE-909) I/O permission bitmap |
| CVE-2008-3597 | chain: game server can access player data structures before initialization has happened leading to NULL dereference |
| CVE-2009-2692 | Chain: Use of an unimplemented network socket operation pointing to an uninitialized handler function (CWE-456) causes a crash because of a null pointer dereference (CWE-476) |
| CVE-2009-0949 | chain: improper initialization of memory can lead to NULL dereference |
Showing 15 of 16 observed examples.
Related Weaknesses
Taxonomy Mappings
- PLOVER: — Incorrect initialization
- CERT C Secure Coding: ARR02-C — Explicitly specify array bounds, even if implicitly defined by an initializer
- The CERT Oracle Secure Coding Standard for Java (2011): DCL00-J — Prevent class initialization cycles
- Software Fault Patterns: SFP4 — Unchecked Status Condition
Frequently Asked Questions
What is CWE-665?
CWE-665 (Improper Initialization) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Class-level weakness. The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
How can CWE-665 be exploited?
Attackers can exploit CWE-665 (Improper Initialization) to read memory, read application data. This weakness is typically introduced during the Implementation, Operation phase of software development.
How do I prevent CWE-665?
Key mitigations include: Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. For example, in Java, if the programmer does not explicitl
What is the severity of CWE-665?
CWE-665 is classified as a Class-level weakness (High abstraction). It has been observed in 16 real-world CVEs.