...
Eliminating violations of syntax rules and other constraints can eliminate serious software vulnerabilities that can lead to the execution of arbitrary code with the permissions of the vulnerable process.
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
MSC00-C | Medium | Probable | Medium | P8 | L2 |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Automated Detection
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| BUILD.WALL BUILD.WERROR | Not All Warnings Are Enabled Warnings Not Treated As Errors | ||||||
SonarQube C/C++ Plugin |
| Warns when the Requires documentation of | |||||||
PVS-Studio | 6.22 | V665 | General analysis rule |
Related Guidelines
SEI CERT C++ Coding Standard | VOID MSC00-CPP. Compile cleanly at high warning levels |
MITRE CWE | CWE-563, Unused variable CWE-570, Expression is always false CWE-571, Expression is always true |
Bibliography
[ISO/IEC 9899:2011] | Section 5.1.1.3, "Diagnostics" |
[Seacord 2013] | Chapter 9, "Recommended Practices" |
[Sutter 2005] | Item 1 |
...