Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

An exception to this rule applies if the intent of the programmer was to intentionally truncate the null-terminated byte string. To be compliant with this standard, this intent must be clearly stated in comments.

Priority: P2 Level: L3

Truncating strings can lead to a loss of data and, in some cases, exploitable vulnerabilities.

Risk Assessment

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

STR34-C

Component

Value

Severity

1 (low) Likelihood

1 (unlikely) Remediation cost

2 (medium)

P2

L3

References