...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level | ||
---|---|---|---|---|---|---|---|
MEM37-C | 3 (high) | 1 (lowunlikely) | 1 (high) | P12 | L1 | P3 | L3 |
Related Vulnerabilities
Search for Examples of vulnerabilities resulting from the violation of this rule can be found on the CERTwebsite CERT website.
References
Wiki Markup |
---|
\[[ISO/IEC 9899-1999|AA. C References#ISO/IEC 9899-1999]] Section 7.18.3, "Limits of other integer types" \[[Seacord 05|AA. C References#Seacord 05]] Chapter 4, "Dynamic Memory Management" \[[RUS-CERT Advisory 2002-08:02|http://cert.uni-stuttgart.de/advisories/calloc.php]] \[[Secunia Advisory SA10635|http://secunia.com/advisories/10635/]] |