CWE-124 Base Incomplete Medium likelihood

Buffer Underwrite ('Buffer Underflow')

A buffer underwrite, also known as buffer underflow, happens when a program writes data to a memory location before the official start of a buffer.

Definition

What is CWE-124?

A buffer underwrite, also known as buffer underflow, happens when a program writes data to a memory location before the official start of a buffer.
This vulnerability occurs when a program miscalculates a write position, placing it outside the allocated buffer's bounds in the 'backward' direction. Common causes include decrementing a pointer or index too many times, performing incorrect pointer arithmetic that results in a negative offset, or directly using a negative index to access an array. The result is a write operation to an unintended, and often critical, memory location. Writing to memory before a buffer can corrupt other program data, function pointers, or critical control structures. This can lead to system crashes, unpredictable behavior, or, if exploited, allow an attacker to hijack the program's execution flow. Developers should rigorously validate all pointer arithmetic and array indices, ensuring they remain within the valid, zero-based range of the allocated buffer.
Real-world impact

Real-world CVEs caused by CWE-124

  • buffer underwrite in firmware verification routine allows code execution via a crafted firmware image

  • Unchecked length of SSLv2 challenge value leads to buffer underflow.

  • Buffer underflow from a small size value with a large buffer (length parameter inconsistency, CWE-130)

  • Buffer underflow from an all-whitespace string, which causes a counter to be decremented before the buffer while looking for a non-whitespace character.

  • Buffer underflow resultant from encoded data that triggers an integer overflow.

  • Product sets an incorrect buffer size limit, leading to "off-by-two" buffer underflow.

  • Negative value is used in a memcpy() operation, leading to buffer underflow.

  • Buffer underflow due to mishandled special characters

How attackers exploit it

Step-by-step attacker path

  1. 1

    In the following C/C++ example, a utility function is used to trim trailing whitespace from a character string. The function copies the input string to a local character string and uses a while statement to remove the trailing whitespace by moving backward through the string and overwriting whitespace with a NUL character.

  2. 2

    However, this function can cause a buffer underwrite if the input character string contains all whitespace. On some systems the while statement will move backwards past the beginning of a character string and will call the isspace() function on an address outside of the bounds of the local buffer.

  3. 3

    The following is an example of code that may result in a buffer underwrite. This code is attempting to replace the substring "Replace Me" in destBuf with the string stored in srcBuf. It does so by using the function strstr(), which returns a pointer to the found substring in destBuf. Using pointer arithmetic, the starting index of the substring is found.

  4. 4

    In the case where the substring is not found in destBuf, strstr() will return NULL, causing the pointer arithmetic to be undefined, potentially setting the value of idx to a negative number. If idx is negative, this will result in a buffer underwrite of destBuf.

Vulnerable code example

Vulnerable C

In the following C/C++ example, a utility function is used to trim trailing whitespace from a character string. The function copies the input string to a local character string and uses a while statement to remove the trailing whitespace by moving backward through the string and overwriting whitespace with a NUL character.

Vulnerable C
char* trimTrailingWhitespace(char *strMessage, int length) {
  		char *retMessage;
  		char *message = malloc(sizeof(char)*(length+1));
```
// copy input string to a temporary string* 
  		char message[length+1];
  		int index;
  		for (index = 0; index < length; index++) {
  		```
  			message[index] = strMessage[index];
  		}
  		message[index] = '\0';
```
// trim trailing whitespace* 
  		int len = index-1;
  		while (isspace(message[len])) {
  		```
  			message[len] = '\0';
  			len--;
  		}
```
// return string without trailing whitespace* 
  		retMessage = message;
  		return retMessage;}
Secure code example

Secure pseudo

Secure pseudo
// Validate, sanitize, or use a safe API before reaching the sink.
function handleRequest(input) {
  const safe = validateAndEscape(input);
  return executeWithGuards(safe);
}
What changed: the unsafe sink is replaced (or the input is validated/escaped) so the same payload no longer triggers the weakness.
Prevention checklist

How to prevent CWE-124

  • Requirements Choose a language that is not susceptible to these issues.
  • Implementation All calculated values that are used as index or for pointer arithmetic should be validated to ensure that they are within an expected range.
Detection signals

How to detect CWE-124

SAST High

Run static analysis (SAST) on the codebase looking for the unsafe pattern in the data flow.

DAST Moderate

Run dynamic application security testing against the live endpoint.

Runtime Moderate

Watch runtime logs for unusual exception traces, malformed input, or authorization bypass attempts.

Code review Moderate

Code review: flag any new code that handles input from this surface without using the validated framework helpers.

Plexicus auto-fix

Plexicus auto-detects CWE-124 and opens a fix PR in under 60 seconds.

Codex Remedium scans every commit, identifies this exact weakness, and ships a reviewer-ready pull request with the patch. No tickets. No hand-offs.

Frequently asked questions

Frequently asked questions

What is CWE-124?

A buffer underwrite, also known as buffer underflow, happens when a program writes data to a memory location before the official start of a buffer.

How serious is CWE-124?

MITRE rates the likelihood of exploit as Medium — exploitation is realistic but typically requires specific conditions.

What languages or platforms are affected by CWE-124?

MITRE lists the following affected platforms: C, C++.

How can I prevent CWE-124?

Choose a language that is not susceptible to these issues. All calculated values that are used as index or for pointer arithmetic should be validated to ensure that they are within an expected range.

How does Plexicus detect and fix CWE-124?

Plexicus's SAST engine matches the data-flow signature for CWE-124 on every commit. When a match is found, our Codex Remedium agent opens a fix PR with the corrected code, tests, and a one-line summary for the reviewer.

Where can I learn more about CWE-124?

MITRE publishes the canonical definition at https://cwe.mitre.org/data/definitions/124.html. You can also reference OWASP and NIST documentation for adjacent guidance.

Ready when you are

Don't Let Security
Weigh You Down.

Stop choosing between AI velocity and security debt. Plexicus is the only platform that runs Vibe Coding Security and ASPM in parallel — one workflow, every codebase.