...
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| LANG.MEM.BO | Buffer overrun | ||||||
|
| Can detect violations of the rule. However, it is unable to handle cases involving | |||||||
Coverity | 6.5 | STRING_OVERFLOW | Fully implemented | ||||||
5.0 |
|
| |||||||
| NNTS.TAINTED |
| |||||||
| 489 S, 109 D, 66 X, 70 X, 71 X | Partially implemented | |||||||
|
|
| |||||||
PRQA QA-C |
| warncall for 'gets' | Partially implemented |
...
CERT C Secure Coding Standard | STR03-C. Do not inadvertently truncate a string |
ISO/IEC TR 24772:2013 | String Termination [CJM] Buffer Boundary Violation (Buffer Overflow) [HCB] Unchecked Array Copying [XYW] |
ISO/IEC TS 17961:2013 | Using a tainted value to write to an object using a formatted input or output function [taintformatio] |
MITRE CWE | CWE-119, Improper Restriction of Operations within the Bounds of a Memory Buffer |
Bibliography
[Dowd 2006] | Chapter 7, "Program Building Blocks" ("Loop Constructs," pp. 327–336) |
[Drepper 2006] | Section 2.1.1, "Respecting Memory Bounds" |
[ISO/IEC 9899:2011] | K.3.5.4.1, "The gets_s Function" |
[Lai 2006] | |
[NIST 2006] | SAMATE Reference Dataset Test Case ID 000-000-088 |
[Seacord 2013b] | Chapter 2, "Strings" |
[xorl 2009] | FreeBSD-SA-09:11: NTPd Remote Stack Based Buffer Overflows |
...