Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

   *Remember to follow the desired coding style

 

Risk Assessment

...

Depending on the library function called, the attacker may be able to use a heap overflow vulnerability to run arbitrary code. The detection of checks specified in description can be automated but the remediation has to be manual.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

ARR38-C

high

likely

medium

P18

L1

Related Guidelines

Bibliography