...
Integer overflow in memory allocation functions can lead to buffer overflows that can be exploited by an attacker to execute arbitrary code with the permissions of the vulnerable process. Most implementations of calloc()
now check to make sure integer overflow does not occur, but it is not always safe to assume the version of calloc()
being used is secure, particularly when using dynamically linnked linked libraries.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
MEM07-A | 3 (high) | 1 (unlikely) | 1 (high) | P3 | L3 |
...