Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Integer overflow in memory allocation functions can lead to buffer overflows that can be exploited by an attacker to execute arbitrary code with the permissions of the vulnerable process. Most implementations of calloc() now check to make sure integer overflow does not occur, but it is not always safe to assume the version of calloc() being used is secure, particularly when using dynamically linked libraries.

Rule Recommendation

Severity

Likelihood

Remediation Cost

Priority

Level

MEM07-A

3 (high)

1 (unlikely)

1 (high)

P3

L3

...