...
Code Block | ||||
---|---|---|---|---|
| ||||
char *improved_strncpy(char * restrict s1, size_t s1count, const char * restrict s2, size_t s2count, size_t n); char *improved_strncat(char * restrict s1, size_t s1count, const char * restrict s2, size_t s2count, size_t n); |
...
Tool | Version | Checker | Description | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| BADFUNC.BO.* | A collection of checks that report uses of library functions prone to internal buffer overflows. | ||||||||||||
Parasoft C/C++test |
| CERT_C-API02-a | Avoid using unsafe string functions which may cause buffer overflows | Polyspace Bug Finder | Include Page | | Polyspace Bug Finder_V | Array access with tainted index | Array index outside bounds during array access Array index from unsecure source possibly outside array bounds |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...
[ISO/IEC 9899:2011] | Annex K (normative) Bounds-checking Interfaces |
...