This vulnerability occurs when a program tries to use a pointer variable before it has been assigned a valid memory address.
Using an uninitialized pointer means your code is reading from or writing to a random, unpredictable location in memory. This often crashes the program (causing a denial of service), but it can also lead to strange behavior, data corruption, or the execution of unintended functions if the pointer is called. An attacker who can control or predict what value ends up in that uninitialized pointer gains significant power. By carefully manipulating memory layout, they might steer the pointer to a location of their choosing, potentially enabling code execution, privilege escalation, or other serious security breaches.
Impact: Read Memory
If the uninitialized pointer is used in a read operation, an attacker might be able to read sensitive portions of memory.
Impact: DoS: Crash, Exit, or Restart
If the uninitialized pointer references a memory location that is not accessible to the product, or points to a location that is "malformed" (such as NULL) or larger than expected by a read or write operation, then a crash may occur.
Impact: Execute Unauthorized Code or Commands
If the uninitialized pointer is used in a function call, or points to unexpected data in a write operation, then code execution may be possible.