...
Recommendation | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
|---|---|---|---|---|---|---|
STR03-C | Medium | Probable | No | NoMedium | P8P4 | L2L3 |
Automated Detection
Tool | Version | Checker | Description | |||||||
|---|---|---|---|---|---|---|---|---|---|---|
| CodeSonar |
| MISC.MEM.NTERM | No Space For Null Terminator | |||||||
| Compass/ROSE | Could detect violations in the following manner: all calls to | |||||||||
| GCC | 8.1 | -Wstringop-truncation | Detects string truncation by strncat and strncpy. | |||||||
| Klocwork |
| NNTS.MIGHT | ||||||||
| LDRA tool suite |
| 115 S, 44 S | Partially implemented | |||||||
| Parasoft C/C++test |
| CERT_C-STR03-a | Avoid overflow due to reading a not zero terminated string | |||||||
| Polyspace Bug Finder |
| Buffer overflow from incorrect string format specifier | CERT C: Rec. STR03-C | Checks for invalid use of standard library string routine (rec. partially supported)String format specifier causes buffer argument of standard library functions to overflow |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...