...
Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
Fortify SCA | V. 5.0 |
| Can detect violations of this recommendation with the CERT C Rule Pack. | ||||||
Compass/ROSE |
|
| Can detect violations of this recommendation by flagging invocations of the following functions:
| ||||||
| 44 S | Fully implemented. | |||||||
| PRQA QA-C |
| Warncall -wc atoi, -wc atol | Partially implemented. |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
...
...
...
| Use of potentially dangerous function |
...
...
| Insufficient input validation |
...
Bibliography
| [ISO/IEC 9899:2011] | Section 7.22.1.4, "The strtol, strtoll, strtoul, and strtoull |
|---|
...
| Functions," |
|---|
...
section 7.22.1.2, "The atoi, atol, and atoll |
|---|
...
| Functions," and |
|---|
...
section 7.21.6.7, "The sscanf |
|---|
...
| Function" | |
|---|---|
| [Klein 2002] |