...
Recommendation | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
|---|---|---|---|---|---|---|
STR02-C | High | Likely | No | NoMedium | P18P9 | L1L2 |
Automated Detection
Tool | Version | Checker | Description | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Astrée |
| Supported by stubbing/taint analysis | |||||||||||
| CodeSonar |
| IO.INJ.COMMAND | Command injection | ||||||||||
| Coverity | 6.5 | TAINTED_STRING | Fully implemented | ||||||||||
| Helix QAC |
| C2956 | |||||||||||
| Klocwork |
| NNTS.TAINTED | |||||||||||
| LDRA tool suite |
| 108 D, 109 D | Partially implemented | ||||||||||
| Parasoft C/C++test | 9.5 | BD-SECURITY-{TDCMD,TDFNAMES,TDSQL}
| CERT_C-STR02-a | Protect against command injection | |||||||||
| Polyspace Bug Finder |
| R2016a
| Checks for:
| Rec. partially covered. |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...