...
Given below is a non-exhaustive list of library functions to which the above rules can apply:
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| |
|
|
|
|
|
|
Risk Assessment
Depending on the library function called, the attacker may be able to use a heap overflow vulnerability to run arbitrary code. The detection of checks specified in description can be automated but the remediation has to be manual.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
ARR38-C | high | likely | medium | P18 | L1 |
Related Guidelines
Wiki Markup |
---|
\[seccode:API00-C. Functions should validate their parameters\] |
WG14 Document: N1579 - Rule 5.34 Forming Invalid pointers by library functions.
...