...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
MEM30-C | 3 (high) | 3 (likely) | 2 (medium) | P18 | L1 |
Related Vulnerabilities
Search for Examples of vulnerabilities resulting from the violation of this rule can be found on the CERTwebsite CERT website.
References
Wiki Markup |
---|
\[[ISO/IEC 9899-1999|AA. C References#ISO/IEC 9899-1999]\] Section 7.20.3.2, "The free function" \[[Seacord 05|AA. C References#Seacord 05]\] Chapter 4, "Dynamic Memory Management" \[[Kerrighan 88|AA. C References#Kerrighan 88]\] Section 7.8.5, "Storage Management" OWASP, [Using freed memory|http://www.owasp.org/index.php/Using_freed_memory] \[[Viega 05|AA. C References#Viega 05]\] Section 5.2.19, "Using freed memory" |