Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Software `Software vulnerabilities can result when a programmer fails to consider all possible data states.

Noncompliant Code Example (

...

if Chain)

This noncompliant code example fails to test for conditions in which a is neither b nor c. This may be the correct behavior in this case, but failure to account for all the values of a can result in logic errors if a unexpectedly assumes a different value.

Code Block
bgColor#FFCCCC
if (a == b) {
  /* ... */
}
else if (a == c) {
  /* ... */
}

Compliant Solution (

...

if Chain)

This compliant solution explicitly checks for the unexpected condition and handles it appropriately.:

Code Block
bgColor#ccccff
if (a == b) {
  /* ... */
}
else if (a == c) {
  /* ... */
}
else {
  /* handleHandle error condition */
}

Noncompliant Code Example (

...

switch)

Even though x is supposed to represent a bit (0 or 1) in the following this noncompliant code example, some previous error may have allowed x to assume a different value. Detecting and dealing with that inconsistent state now sooner rather than later will make makes the error easier to find and may prevent security violations.

Code Block
bgColor#ffcccc
switch(x) {
  case 0: foo(); break;
  case 1: bar(); break;
}

Compliant Solution (

...

switch)

The following ompliant solution takes care to provide This compliant solution provides the default label to handle all valid possible values of type int:

Code Block
bgColor#ccccff
switch(x) {
  case 0: foo(); break;
  case 1: bar(); break;
  default: /* handleHandle error */ break;
} 

Noncompliant Code Example (Zune 30)

This noncompliant code example shows incomplete logic when converting dates. The code is adapted from C code that appeared in the Zune 30 media player, causing many players to lock up on December 30, 2008, at midnight PST. This noncompliant code example comes from the ConvertDays function in the real-time clock (RTC) routines for the MC13783 PMIC RTC. This noncompliant code sample takes the number of days since January 1, 1980, and computes the correct year and number of days since January 1 of the correct year.The flaw in the code occurs when days has the value 366 because the loop never terminates. This bug manifested itself on the 366th day of 2008, which was the first leap year in which this code was activeIt contains incomplete logic that causes a denial of service when converting dates.

Code Block
bgColor#FFCCCC
final static int ORIGIN_YEAR = 1980;
UINT32 days = /* numberNumber of days since January 1, 1980 */
public void convertDays(long days){  
	int year = ORIGIN_YEAR;
    /* ... */

    while (days > 365) {
    	if (IsLeapYear(year)) {
        	if (days > 366) {
            	days -= 366;
              	year += 1;
            }
        }
  else {
            days -= 365;
            year += 1;
        }
    }
}

The original ConvertDays() function in the real-time clock (RTC) routines for the MC13783 PMIC RTC takes the number of days since January 1, 1980, and computes the correct year and number of days since January 1 of the correct year.

The flaw in the code occurs when days has the value 366 because the loop never terminates. This bug manifested itself on the 366th day of 2008, which was the first leap year in which this code was active.

Compliant Solution (Zune 30)

This proposed rewrite is provided by http://www.aeroxp.org/2009/01/lesson-on-infinite-loops "A Lesson on Infinite Loops" by Bryant Zadegan [Zadegan 2009]. The loop is guaranteed to exit, as days decreases for each iteration of the loop, unless the while condition fails, and in which case the loop terminates.

Code Block
bgColor#ccccff
final static int ORIGIN_YEAR = 1980;
UINT32 days = /* numberNumber of days since January 1, 1980 */
public void convertDays(long days){    
	int year = ORIGINYEARORIGIN_YEAR;
    /* ... */

    int daysThisYear = (IsLeapYear(year) ? 366 : 365);
    while (days > daysThisYear) {
    	days -= daysThisYear;
        year += 1;
        daysThisYear = (IsLeapYear(year) ? 366 : 365);
    }
}

This compliant solution is for illustrative purposes and is not necessarily may differ from the solution implemented by Microsoft.

...

Applicability

Failing to take into account all possibilities within a logic statement can lead to a corrupted running state, potentially resulting in unintentional information disclosure or abnormal termination.

Guideline

Severity

Likelihood

Remediation Cost

Priority

Level

MSC60-JG

medium

probable

medium

P8

L2

Automated Detection

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Related Guidelines 

C Secure Coding Standard: MSC01-C. Strive for logical completeness

C++ Secure Coding Standard: MSC01-CPP. Strive for logical completeness

ISO/IEC TR 24772 "CLL Switch Statements and Static Analysis"

Automated Detection

ToolVersionCheckerDescription
Parasoft Jtest
Include Page
Parasoft_V
Parasoft_V
CERT.MSC57.PDCL
CERT.MSC57.PDS
Place "default" as the last case of the "switch" statement
Provide "default:" for each "switch" statement
PVS-Studio

Include Page
PVS-Studio_V
PVS-Studio_V

V6002V6003V6007V6018V6031V6037V6057V6077

Related Guidelines

Bibliography

...

§2.7.2, "Errors of Omission and Addition"
[Viega 2005]

...

§5.2.17, "Failure to Account for Default Case in Switch"
[

...


...

Image Modified Image Modified Image Modified