...
Tool | Version | Checker | Description | |||||||
---|---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| LANG.MEM.BO | Buffer overrun | |||||||
|
|
| ||||||||
Coverity | 6.5 | BUFFER_SIZE | Fully implemented | |||||||
5.0 |
| Can detect violations of this rule with CERT C Rule Pack | ||||||||
| ABR |
| ||||||||
LDRA tool suite |
| 64 X, 66 X, 68 X, 69 X, 70 X, 71 X, 79 X | Partially Implmented | |||||||
Parasoft C/C++test | 9.5 | BD-PB-OVERF{RD,WR,FMT,NZT} | Fully implemented | |||||||
Parasoft Insure++ | Runtime analysis | |||||||||
Polyspace Bug Finder | R2016a | Guarantee that library functions do not form invalid pointers | ||||||||
PRQA QA-C |
| 2845, 2846, 2847, 2848, 2849, 2930, 2932, 2933, 2934 | Fully implemented | |||||||
|
|
|
Related Vulnerabilities
CVE-2016-2208 results from a violation of this rule. The attacker can supply a value used to determine how much data is copied into a buffer via memcpy()
, resulting in a buffer overlow of attacker-controlled data.
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...