...
TOCTOU race condition vulnerabilities can be exploited to gain elevated privileges.
Rule | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
|---|---|---|---|---|---|---|
POS35-C | High | Likelyhigh | likelyNo | mediumNo | P18 P9 | L1 L2 |
Automated Detection
Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| Astrée |
| user_defined | Soundly supported | ||||||
| Axivion Bauhaus Suite |
| CertC-POS35 | |||||||
| Compass/ROSE | Can detect some violations of this rule. In particular, it ensures that calls to | ||||||||
| Coverity |
| TOCTOU | Implemented | ||||||
| Helix QAC |
| DF4886, DF4887, DF4888 | |||||||
| Klocwork |
| SV.TOCTOU.FILE_ACCESS | |||||||
| Parasoft C/C++test |
| CERT_C-POS35-b | Avoid race conditions while checking for the existence of a symbolic link | ||||||
| Polyspace Bug Finder |
| CERT C: Rule POS35-C | Checks for file access between time of check and use (TOCTOU) (rule fully covered) |
...