Home / Vulnerability Database / C or C++ : Reference to array element out of bounds
C/C++
C or C++ : Reference to array element out of bounds
Overview
Call of the element out of array bounds may lead to incorrect application behavior, crashes, or data leak. If you erroneously call the element out of array bounds, the program reads the contents of memory cells not belonging to the array, or writes something, spoiling the contents of other variables, perhaps in other programs, and then continues its work.
Specific overflows, such as overflow in a stack frame, allow an attacker to download and execute arbitrary machine code on behalf of the program and with the rights of the account from which it is executed.
Unlike memory-safe languages (e.g., Java), C does not provide built-in mechanisms to detect incorrect operations with memory.
MEDIUM
DerScanner Severity Score
Do you want to fix C or C++ : Reference to array element out of bounds in your application?
See also
C/C++
C or C++ : Dead store
C/C++
C or C++ : Use after free
C/C++
