...
Tool | Version | Checker | Description | |||||||
---|---|---|---|---|---|---|---|---|---|---|
Astrée |
| Supported, but no explicit checker | ||||||||
CodeSonar |
| LANG.MEM.BO | Buffer overrun | |||||||
Can detect violations of the rule. However, it is unable to handle cases involving | ||||||||||
Coverity |
| STRING_OVERFLOW BUFFER_SIZE OVERRUN STRING_SIZE | Fully implemented | |||||||
5.0 | ||||||||||
| NNTS.MIGHT | |||||||||
| 489 S, 109 D, 66 X, 70 X, 71 X | Partially implemented | ||||||||
Parasoft C/C++test |
| BD-PB-ARRAY, BD-PB-OVERFWR, BD-SECURITY-BUFWRITE, BD-SECURITY-OVERFWR, SECURITY-12 | Implemented | |||||||
Polyspace Bug Finder | R2016a |
| Buffer overflow from incorrect string format specifier Destination buffer overflow in string manipulation Invalid use of standard library string routine | Array index outside bounds during array access String format specifier causes buffer argument of standard library functions to overflow Function writes to buffer at offset greater than buffer size Standard library string function called with invalid arguments String does not terminate with null character Pointer dereferenced outside its bounds Argument is from an unsecure source and may be NULL or not NULL-terminated Dangerous functions cause possible buffer overflow in destination buffer Guarantee that storage for strings has sufficient space for character data and null terminator | ||||||
PRQA QA-C |
| 2845, 2846, 2847, 2848, 2849, 5009 | Partially implemented | |||||||
PRQA QA-C++ | 4.2 | 0145, 2845, 2846, 2847, 2848, 2849, 2840, 2841, 2842, 2843, 2844, 2930, 2831, 2831, 2832, 2833, 2934 | ||||||||
PVS-Studio |
| V518, V645, V727, V755 | ||||||||
|
...