...
Code Block | ||||
---|---|---|---|---|
| ||||
char *improved_strncpy(char * restrict s1, size_t s1count, const char * restrict s2, size_t s2count, size_t n); char *improved_strncat(char * restrict s1, size_t s1count, const char * restrict s2, size_t s2count, size_t n); |
...
Tool | Version | Checker | Description | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| BADFUNC.BO.* | A collection of checks that report uses of library functions prone to internal buffer overflows. | ||||||||||||
Parasoft C/C++test |
| CERT_C-API02-a | Avoid using unsafe string functions which may cause buffer overflows | Polyspace Bug Finder | Include Page | | Polyspace Bug Finder_V | Array access with tainted index | Array index outside bounds during array access Array index from unsecure source possibly outside array bounds Pointer dereferenced outside its bounds Dangerous functions cause possible buffer overflow in destination buffer Pointer from an unsecure source may be NULL or point to unknown memory Offset is from an unsecure source and dereference may be out of bounds |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...
[ISO/IEC 9899:2011] | Annex K (normative) Bounds-checking Interfaces |
...