...
Tool | Version | Checker | Description | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| LANG.MEM.BO | Buffer overrun | ||||||||
|
|
| |||||||||
Coverity |
| BUFFER_SIZE BAD_SIZEOF BAD_ALLOC_STRLEN BAD_ALLOC_ARITHMETIC | Fully implemented | Implemented | |||||||
5.0 |
| Can detect violations of this rule with CERT C Rule Pack | |||||||||
| ABV.ANY_SIZE_ARRAY |
| |||||||||
LDRA tool suite |
| 64 X, 66 X, 68 X, 69 X, 70 X, 71 X, 79 X | Partially Implmented | ||||||||
Parasoft C/C++test | 9.5 | BD-PB-OVERF{RD,WR,FMT,NZT} | Fully implemented | ||||||||
Parasoft Insure++ | Runtime analysis | ||||||||||
Polyspace Bug Finder | R2016a | Guarantee that library functions do not form invalid pointers | |||||||||
PRQA QA-C |
| 2845, 2846, 2847, 2848, 2849, 2930, 2932, 2933, 2934 | Fully implemented | ||||||||
|
|
|
Related Vulnerabilities
CVE-2016-2208 results from a violation of this rule. The attacker can supply a value used to determine how much data is copied into a buffer via memcpy()
, resulting in a buffer overlow of attacker-controlled data.
...