...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
ARR34-CPP | high | probable | high | P6 | L2 |
Related Vulnerabilities
The fun with erase() article by Chris Rohlf discusses the exploit potential of a program that calls vector::erase()
with invalid iterator ranges.
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
\[[Sutter 05|AA. Bibliography#Sutter 05]\] Item 83: Use a checked STL implementation.
\ Wiki Markup
[[Meyers 01|AA. Bibliography#Meyers 01] \] Item 21: Always have comparison functions return false for equal values.
\[
[ISO/IEC 14882-2003|AA. Bibliography#ISO/IEC 14882-2003] \] Section 24: Iterators Library.
...
ARR33-CPP. Guarantee that copies are made into storage of sufficient size 06. Arrays and the STL (ARR) ARR35-CPP. Do not allow loops to iterate beyond the end of an array or container