...
Tool | Version | Checker | Description | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| CodeSonar |
| LANG.MEM.BO | Buffer overrun | ||||||||
|
|
| |||||||||
| Coverity |
| BUFFER_SIZE BAD_SIZEOF BAD_ALLOC_STRLEN BAD_ALLOC_ARITHMETIC | Fully implemented | Implemented | |||||||
5.0 |
| Can detect violations of this rule with CERT C Rule Pack | |||||||||
| ABV.ANY_SIZE_ARRAY |
| |||||||||
| LDRA tool suite |
| 64 X, 66 X, 68 X, 69 X, 70 X, 71 X, 79 X | Partially Implmented | ||||||||
| Parasoft C/C++test | 9.5 | BD-PB-OVERF{RD,WR,FMT,NZT} | Fully implemented | ||||||||
| Parasoft Insure++ | Runtime analysis | ||||||||||
| Polyspace Bug Finder | R2016a | Guarantee that library functions do not form invalid pointers | |||||||||
| PRQA QA-C |
| 2845, 2846, 2847, 2848, 2849, 2930, 2932, 2933, 2934 | Fully implemented | ||||||||
|
|
|
Related Vulnerabilities
CVE-2016-2208 results from a violation of this rule. The attacker can supply a value used to determine how much data is copied into a buffer via memcpy(), resulting in a buffer overlow of attacker-controlled data.
...