...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
INT32-C | 3 (high) | 2 (probable) | 1 (high) | P6 | L2 |
Related Vulnerabilities
Search for Examples of vulnerabilities resulting from the violation of this rule can be found on the CERT website.
References
Wiki Markup |
---|
\[[Dowd 06|AA. C References#Dowd 06]] Chapter 6, "C Language Issues" (Arithmetic Boundary Conditions, pp. 211-223) \[[ISO/IEC 9899-1999|AA. C References#ISO/IEC 9899-1999]] Section 6.5, "Expressions," and Section 7.10, "Sizes of integer types <limits.h>" \[[Seacord 05|AA. C References#Seacord 05]] Chapter 5, "Integers" \[[Viega 05|AA. C References#Viega 05]] Section 5.2.7, "Integer overflow" \[[VU#551436|AA. C References#VU#551436]\] \[[Warren 02|AA. C References#Warren 02]] Chapter 2, "Basics" |