...
The first time you call strtok()
, you pass the string to be parsed into tokens, the character delimiter, and the address of the variable to return the result in. The strtok()
function parses the string up to the first instance of the delimiter character, replaces the character in place with a null NULL byte ('\0'), and puts the address of the first character in the token to the passed-in variable. Subsequent calls to strtok()
begin parsing immediately after the recently-placed null NULL character.
Because strtok()
modifies its argument, the string is subsequently unsafe and cannot be used in its original form. If you need to preserve the original string, copy it into a buffer and pass the address of the buffer to strtok()
instead of the original string.
...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
STR06-A | 2 (lowmedium) | 2 (probable) | 3 (low) | P12 | L1 |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
References
Wiki Markup |
---|
\[[ISO/IEC 9899-1999|AA. C References#ISO/IEC 9899-1999]\] Section 7.21.5.8, "The strtok function" \[Unix Man page\] strtok(3) |