...
Code Block | ||||
---|---|---|---|---|
| ||||
if (foo(x = y)) { /* ... */ } |
Noncompliant Code Example
This noncompliant code example has a typo that results in an assignment rather than a comparison.
Code Block | ||||
---|---|---|---|---|
| ||||
while (ch == ' ' && ch = '\t' && ch == '\n') {
/* ... */
}
|
Many compilers will warn about this condition. This coding error would typically be eliminated by adherence to MSC00-C. Compile cleanly at high warning levels. Although this code compiles, it will cause unexpected behavior to an unsuspecting programmer. If the intent was to verify a string such as a password, user name, or group user ID, the code may produce significant vulnerabilities and require significant debugging.
Compliant Solution (RHS Variable)
When comparisons are made against things other than variables, placing the variable on the right of the comparison operation can prevent a spurious assignment.
In this code example, the constants are placed on the left-hand side of each comparison, ensuring a compiler diagnostic at any warning level. If the programmer were to inadvertently use an assignment operator, the statement would try to assign a ch
to a '\t'
and become invalid.
Code Block | ||||
---|---|---|---|---|
| ||||
while (' ' == ch && '\t' = ch && '\n' == ch) {
/* ... */
} |
Thanks to the compiler, the typo will be easily spotted and fixed.
Code Block | ||||
---|---|---|---|---|
| ||||
while (' ' == ch && '\t' == ch && '\n' == ch) {
/* ... */
} |
As a result, any mistaken use of the assignment operator that could otherwise create a vulnerability for operations such as string verification will result in a compiler diagnostic regardless of compiler, warning level, or implementation.
Risk Assessment
Errors of omission can result in unintended program flow.
...
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
|
| Could detect violations of this recommendation by identifying any assignment expression as the top-level expression in an | |||||||
| CC2.EXP18 CC2.EXP21 | Fully implemented | |||||||
|
| Can detect violations of this recommendation when the | |||||||
| ASSIGCOND.GEN |
| |||||||
| 9 S |
| |||||||
PRQA QA-C |
| 3314 | Partially implemented |
...
CERT C++ Secure Coding Standard | EXP19-CPP. Do not perform assignments in conditional expressions |
CERT Oracle Secure Coding Standard for Java | 53. Do not perform assignments in conditional expressions |
ISO/IEC TR 24772:2013 | Likely Incorrect Expression [KOA] |
ISO/IEC TS 17961 | No assignment in conditional expressions [boolasgn] |
MITRE CWE | CWE-480, Use of Incorrect Operator |
Bibliography
[Dutta 03] | "Best Practices for Programming in C" |
[Hatton 1995] | Section 2.7.2, "Errors of Omission and Addition" |
...