Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Fully implemented detectionR2016a, , S3518

Tool

Version

Checker

Description

Astrée
Include Page
Astrée_V
Astrée_V

int-division-by-zero

int-modulo-by-zero

Fully checked
Axivion Bauhaus Suite

Include Page
Axivion Bauhaus Suite_V
Axivion Bauhaus Suite_V

CertC-INT33
CodeSonar
Include Page
CodeSonar_V
CodeSonar_V
LANG.ARITH.DIVZERO
LANG.ARITH.FDIVZERO
Division by zero
Float Division By Zero
Compass/ROSE

Can detect some violations of this rule (In particular, it ensures that all operations involving division or modulo are preceded by a check ensuring that the second operand is nonzero.)

Coverity
Include Page
Coverity_V
Coverity_V

DIVIDE_BY_ZERO

Fully implemented
Cppcheck
Include Page
Cppcheck_V
Cppcheck_V
zerodiv
zerodivcond

Context sensitive analysis of division by zero
Not detected for division by struct member / array element / pointer data that is 0
Detected when there is unsafe division by variable before/after test if variable is zero

Cppcheck Premium

Include Page
Cppcheck Premium_V
Cppcheck Premium_V

zerodiv
zerodivcond

premium-cert-int33-c

Context sensitive analysis of division by zero
Not detected for division by struct member / array element / pointer data that is 0
Detected when there is unsafe division by variable before/after test if variable is zero
Helix QAC

Include Page
Helix QAC_V
Helix QAC_V

C2830

C++2830

DF2831, DF2832, DF2833


Klocwork
Include Page
Klocwork_V
Klocwork_V

DBZ.CONST
DBZ.CONST.CALL
DBZ.GENERAL
DBZ.ITERATOR
DBZ.ITERATOR.CALL


LDRA tool suite
Include Page
LDRA_V
LDRA_V

43 D, 127 D, 248 S, 629 S, 80 X

Partially implemented
Parasoft C/C++test9.5BD-PB-ZERO
Include Page
Parasoft_V
Parasoft_V

CERT_C-INT33-a

Avoid division by zero
Parasoft Insure++

Runtime analysis
Polyspace Bug Finder

Include Page
Polyspace Bug Finder_V
Polyspace Bug Finder

_V

CERT C: Rule INT33-C


Checks for:

  • Integer division by zero
  • Tainted division operand
  • Tainted modulo operand

Dividing integer number by zero

Division / operands from an unsecure source

Remainder % operands are from an unsecure source

PRQA QA-C
Include Page
PRQA QA-C_vPRQA QA-C_v

2830 (C)
2831 (D)
2832 (A)
2833 (S)
2834 (P)

Fully implementedPRQA QA-C++
Include Page
cplusplus:PRQA QA-C++_Vcplusplus:PRQA QA-C++_V2831, 2832, 2833, 2834SonarQube C/C++ Plugin
Include Page
SonarQube C/C++ Plugin_VSonarQube C/C++ Plugin_V

Rule fully covered.

SonarQube C/C++ Plugin
Include Page
SonarQube C/C++ Plugin_V
SonarQube C/C++ Plugin_V
S3518
PVS-Studio

Include Page
PVS-Studio_V
PVS-Studio_V

V609
TrustInSoft Analyzer

Include Page
TrustInSoft Analyzer_V
TrustInSoft Analyzer_V

division_by_zero

Exhaustively verified (see one compliant and one non-compliant example).

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Related Guidelines

Key here (explains table format and definitions)

SEI Coding Standard 

Taxonomy

Taxonomy item

Relationship

CERT CINT32-C. Ensure that operations on signed integers do not result in overflowPrior to 2018-01-12: CERT: Unspecified Relationship
CERT Oracle Secure Coding Standard for JavaNUM02-J. Ensure that division and remainder operations do not result in divide-by-zero errorsPrior to 2018-01-12: CERT: Unspecified Relationship
ISO/IEC TS 17961Integer division errors [diverr]Prior to 2018-01-12: CERT: Unspecified Relationship
CWE 2.11MITRE CWECWE-369, Divide By Zero2017-07-07: CERT: Exact

CERT-CWE Mapping Notes

Key here for mapping notes

CWE-682 and INT33-C

CWE-682 = Union( INT33-C, list) where list =


  • Incorrect calculations that do not involve division by zero


Bibliography

[Seacord 2013b]Chapter 5, "Integer Security"
[Warren 2002]Chapter 2, "Basics"

...