This vulnerability of “Improper Restriction of Operations within the Bounds of a Memory Buffer” occurs when an offender operates outside the intended buffer allowing them to read, write, or execute at the outside location. Many articles have been written about this vulnerability and examples given by Lucian Constantian explained how this vulnerability can allow for privilege escalation, DoS attacks, and out-of-bounds reads. Constantian also explains ways to help prevent or detect buffer overflows such as by using memory-safe programming, ASLR, PIE, and compiler flags and extensions.

Resources:

Constantin, L. (2020, January 22). What is a buffer overflow? And how hackers exploit these vulnerabilities. CSO Online. https://www.csoonline.com/article/568835/what-is-a-buffer-overflow-and-how-hackers-exploit-these-vulnerabilities.html

CWE –    CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer (4.14). (n.d.). https://cwe.mitre.org/data/definitions/119.html

NVD – CVE-2023-3953. (n.d.). https://nvd.nist.gov/vuln/detail/CVE-2023-3953

Truta, F. (2019, December 4). SQL Injection loses #1 spot as most dangerous attack technique – Security Boulevard. Security Boulevard. https://securityboulevard.com/2019/12/sql-injection-loses-1-spot-as-most-dangerous-attack-technique/