...
Code Block | ||||
---|---|---|---|---|
| ||||
char *improved_strncpy(char * restrict s1, size_t s1count, const char * restrict s2, size_t s2count, size_t n); char *improved_strncat(char * restrict s1, size_t s1count, const char * restrict s2, size_t s2count, size_t n); |
...
Failure to follow this recommendation can result in improper memory accesses and buffer overflows that are detrimental to the correct and continued execution of the program.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
API02-C | High | Likely | High | P9 | L2 |
Automated Detection
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| BADFUNC.BO.* | A collection of checks that report uses of library functions prone to internal buffer overflows. | ||||||
Parasoft C/C++test |
Array access with tainted index
| CERT_C-API02-a | Avoid using unsafe string functions which may cause buffer overflows |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...
Key here (explains table format and definitions)
Taxonomy | Taxonomy item | Relationship |
---|
Bibliography
[ISO/IEC 9899:2011] | Annex K (normative) Bounds-checking Interfaces |
...