Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Assuming that allocating zero bytes results in an error can lead to buffer overflows when zero bytes are allocated. Buffer overflows can be exploited by an attacker to run arbitrary code with the permissions of the vulnerable process.

Rule Recommendation

Severity

Likelihood

Remediation Cost

Priority

Level

MEM04-A

3 (high)

2 (probable)

2 (medium)

P12

L1

...