The C Standard identifies the following condition under which division and remainder operations result in undefined behavior (UB):
UB | Description |
The value of the second operand of the |
Ensure that division and remainder operations do not result in divide-by-zero errors
Wiki Markup |
---|
Division and modulo operations are susceptible to divide-by-zero errors. According to section 6.5.5, paragraph 5 of \[[ISO/IEC 9899:1999|AA. Bibliography#ISO/IEC 9899-1999]\] (see also [undefined behavior 42 | CC. Undefined Behavior#ub_42] of Annex J): |
...
.
Division
The result of the /
operator is the quotient from the division of the first arithmetic operand by the second arithmetic operand. Division operations are susceptible to divide-by-zero errors. Overflow can also occur during two's complement signed integer division when the dividend is equal to the minimum (most negative) value for the signed integer type and the divisor is equal to —1 −1.
(see See INT32-C. Ensure that operations on signed integers do not result in overflow.).
Noncompliant Code Example
This noncompliant code example can result in prevents signed integer overflow in compliance with INT32-C. Ensure that operations on signed integers do not result in overflow but fails to prevent a divide-by-zero error during the division of the signed operands sl1
and sl2
.operands s_a
and s_b
:
Code Block | ||||
---|---|---|---|---|
| ||||
#include <limits.h> void func(signed long sl1s_a, sl2, signed long s_b) { signed long result; if ((s_a == LONG_MIN) && (s_b == -1)) { /* InitializeHandle sl1error and sl2 */ } else { result = sl1s_a / sl2s_b; } /* ... */ } |
Compliant Solution
This compliant solution tests the suspect division operation to guarantee there is no possibility of divide-by-zero errors or signed overflow.:
Code Block | ||||
---|---|---|---|---|
| ||||
#include <limits.h> void func(signed long sl1s_a, sl2, result; /* Initialize sl1 and sl2 */ if ( (sl2signed long s_b) { signed long result; if ((s_b == 0) || ( (sl1s_a == LONG_MIN) && (sl2s_b == -1) ) ) { /* handleHandle error condition */ } else { result = sl1s_a / sl2s_b; } /* ... */ } |
...
Remainder
The modulo remainder operator provides the remainder when two operands of integer type are divided.
Noncompliant Code Example
This noncompliant code example can result in example prevents signed integer overflow in compliance with INT32-C. Ensure that operations on signed integers do not result in overflow but fails to prevent a divide-by-zero error during the modulo remainder operation on the signed operands sl1
and sl2
.operands s_a
and s_b
:
Code Block | ||||
---|---|---|---|---|
| ||||
#include <limits.h> void func(signed long sl1, sl2,s_a, signed long s_b) { signed long result; if ((s_a == LONG_MIN) && (s_b == -1)) { /* Initialize sl1 and sl2Handle error */ } else { result = sl1s_a % sl2; s_b; } /* ... */ } |
Compliant Solution
This compliant solution tests the suspect modulo operation remainder operand to guarantee there is no possibility of a divide-by-zero error or an overflow error.:
Code Block | ||||
---|---|---|---|---|
| ||||
#include <limits.h> void func(signed long sl1s_a, sl2, result; /* Initialize sl1 and sl2 */ if ( (sl2 signed long s_b) { signed long result; if ((s_b == 0 ) || ( (sl1s_a == LONG_MIN) && (sl2s_b == -1) ) ) { /* handleHandle error condition */ } else { result = sl1s_a % sl2s_b; } /* ... */ } |
Risk Assessment
A divide-by-zero error can result in abnormal program termination and denial of service.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
INT33-C |
Low |
Likely |
Medium | P6 | L2 |
Automated Detection
Tool |
---|
Fortify SCA Version 5.0 with CERT C Rule Pack can detect violations of this rule.
...
Version | Checker | Description | |||||||
---|---|---|---|---|---|---|---|---|---|
Astrée |
| int-division-by-zero int-modulo-by-zero | Fully checked | ||||||
Axivion Bauhaus Suite |
| CertC-INT33 | |||||||
CodeSonar |
| LANG.ARITH.DIVZERO LANG.ARITH.FDIVZERO | Division by zero Float Division By Zero | ||||||
Compass/ROSE | Can detect some violations of this rule |
...
(In particular, it ensures that all operations involving division or modulo are preceded by a check ensuring that the second operand is nonzero.) | |||||||||
Coverity |
| DIVIDE_BY_ZERO | Fully implemented | ||||||
Cppcheck |
| zerodiv zerodivcond | Context sensitive analysis of division by zero | ||||||
Cppcheck Premium |
| zerodiv premium-cert-int33-c | Context sensitive analysis of division by zero Not detected for division by struct member / array element / pointer data that is 0 Detected when there is unsafe division by variable before/after test if variable is |
...
zero | |||||||||
Helix QAC |
| C2830 C++2830 DF2831, DF2832, DF2833 | |||||||
Klocwork |
| DBZ.CONST | |||||||
LDRA tool suite |
| 43 D, 127 D, 248 S, 629 S, 80 X | Partially implemented | ||||||
Parasoft C/C++test |
| CERT_C-INT33-a | Avoid division by zero | ||||||
Parasoft Insure++ | Runtime analysis | ||||||||
Polyspace Bug Finder |
| Checks for:
Rule fully covered. | |||||||
SonarQube C/C++ Plugin |
| S3518 | |||||||
PVS-Studio |
| V609 | |||||||
TrustInSoft Analyzer |
| division_by_zero | Exhaustively verified (see one compliant and one non-compliant example). |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Other Languages
...
Related Guidelines
Key here (explains table format and definitions)
Taxonomy | Taxonomy item | Relationship |
---|---|---|
CERT C | INT32-C. Ensure that operations on signed integers do not result in overflow | Prior to 2018-01-12: CERT: Unspecified Relationship |
CERT Oracle Secure Coding Standard for Java | NUM02-J |
...
...
...
Prior to 2018-01-12: CERT: Unspecified Relationship | ||
ISO/IEC TS 17961 | Integer division errors [diverr] | Prior to 2018-01-12: CERT: Unspecified Relationship |
CWE 2.11 | CWE-369, Divide By Zero | 2017-07-07: CERT: Exact |
CERT-CWE Mapping Notes
Key here for mapping notes
CWE-682 and INT33-C
CWE-682 = Union( INT33-C, list) where list =
- Incorrect calculations that do not involve division by zero
Bibliography
[Seacord 2013b] | Chapter 5, "Integer Security" |
[Warren 2002] | Chapter 2, "Basics" |
...
References
Wiki Markup |
---|
\[[ISO/IEC 9899:1999|AA. Bibliography#ISO/IEC 9899-1999]\] Section 6.5.5, "Multiplicative operators"
\[[MITRE 07|AA. Bibliography#MITRE 07]\] [CWE ID 369|http://cwe.mitre.org/data/definitions/369.html], "Divide By Zero"
\[[Seacord 05|AA. Bibliography#Seacord 05]\] Chapter 5, "Integers"
\[[Warren 02|AA. Bibliography#Warren 02]\] Chapter 2, "Basics" |
04. Integers (INT) INT34-C. Do not shift a negative number of bits or more bits than exist in the operand