...
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
Compass/ROSE | Can detect violations of this rule. In particular, ROSE ensures that any pointer returned by | ||||||||
|
| CHECKED_RETURN | Finds instances where a pointer is checked against | ||||||
| NULL_RETURNS | Identifies functions that can return a null pointer but are not checked. | |||||||
| REVERSE_INULL | Identifies code that dereferences a pointer and then checks the pointer against | |||||||
| FORWARD_NULL | Can find the instances where | |||||||
Fortify SCA | 5.0 | ||||||||
| NPD.* *RNPD.* | ||||||||
| 45 D | Fully implemented. | |||||||
PRQA QA-C |
| 0504 | Fully implemented. | ||||||
Splint |
|
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
CERT C++ Secure Coding Standard | EXP34-CPP. Ensure a null pointer is not dereferenced |
CERT Oracle Secure Coding Standard for Java | EXP01-J. Never dereference null pointers |
ISO/IEC TR 24772 | Pointer casting and pointer type changes [HFC] Null pointer dereference [XYH] |
ISO/IEC TS 17961 (Draft) | Dereferencing an out-of-domain pointer [nullref] |
MITRE CWE | CWE-476, NULL Pointer dereference |
Bibliography
[Goodin 2009] | |
[Jack 2007] | |
[Liu 2009] | |
[van Sprundel 2006] | |
[Viega 2005] | Section 5.2.18, "Null-Pointer Dereference" |
...