...
Eliminating violations of syntax rules and other constraints can eliminate serious software vulnerabilities that can lead to the execution of arbitrary code with the permissions of the vulnerable process.
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
MSC00-C | Medium | Probable | Medium | P8 | L2 |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Automated Detection
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| BUILD.WALL BUILD.WERROR | Not All Warnings Are Enabled Warnings Not Treated As Errors | ||||||
PVS-Studio |
| V665 | |||||||
SonarQube C/C++ Plugin |
|
Warns when the Requires documentation of |
Related Guidelines
SEI CERT C++ |
Coding Standard | VOID MSC00-CPP. Compile cleanly at high warning levels |
MITRE CWE | CWE-563, Unused variable CWE-570, Expression is always false CWE-571, Expression is always true |
Bibliography
[ISO/IEC 9899:2011] | Section 5.1.1.3, "Diagnostics" |
[Seacord 2013] | Chapter 9, "Recommended Practices" |
[Sutter 2005] | Item 1 |
...