...
Failure to follow this recommendation can result in improper memory accesses and buffer overflows that are detrimental to the correct and continued execution of the program.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
API02-C | High | Likely | High | P9 | L2 |
Automated Detection
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| BADFUNC.BO.* | A collection of checks that report uses of library functions prone to internal buffer overflows. | ||||||
Parasoft C/C++test |
|
|
| SECURITY- |
12, SECURITY- |
07 | |||
Polyspace Bug Finder | R2016a | Array access with tainted index | Functions that read or write to or from an array should take an argument to specify the source or target size |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...
Key here (explains table format and definitions)
Taxonomy | Taxonomy item | Relationship |
---|
Bibliography
[ISO/IEC 9899:2011] | Annex K (normative) Bounds-checking Interfaces |
...
...