...
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
Astrée |
| Supported: Astrée supports the implementation of library stubs to verify this guideline. | |||||||
Axivion Bauhaus Suite |
| CertC-STR32 | Partially implemented: can detect some violation of the rule | ||||||
CodeSonar |
| MISC.MEM.NTERM.CSTRING | Unterminated C String | ||||||
Compass/ROSE | Can detect some violations of this rule | ||||||||
Coverity |
| STRING_NULL | Fully implemented | ||||||
Klocwork |
| NNTS.TAINTED | |||||||
LDRA tool suite |
| 404 S, 600 S | Partially implemented | ||||||
Parasoft C/C++test |
| CERT_C-STR32-a | Avoid overflow due to reading a not zero terminated string | ||||||
Polyspace Bug Finder |
| Invalid use of standard library string routine Standard function call with incorrect arguments | Standard library string function called with invalid arguments Argument to a standard function does not meet requirements for use in the function Argument is from an unsecure source and may be NULL or not NULL-terminated Use of the string handling function from | ||||||
PRQA QA-C |
| 2835, 2836, 2839 | |||||||
PRQA QA-C++ |
| 0145 | |||||||
PVS-Studio |
| V692 | |||||||
TrustInSoft Analyzer |
| match format and arguments | Partially verified. |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...