...
The use of the rand() function can result in predictable random numbers.
Rule | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
|---|---|---|---|---|---|---|
MSC30-C | Medium | Unlikely | Yes | LowNo | P6P4 | L2L3 |
Automated Detection
Tool | Version | Checker | Description | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Astrée |
| stdlib-use-rand | Fully checked | |||||||||||||||||||||
| Axivion Bauhaus Suite |
| CertC-MSC30 | ||||||||||||||||||||||
| Clang |
| cert-msc30-c | Checked by clang-tidy | |||||||||||||||||||||
| CodeSonar |
| BADFUNC.RANDOM.RAND | Use of rand | |||||||||||||||||||||
| Compass/ROSE | ||||||||||||||||||||||||
| Coverity |
| DONTCALL | Implemented - weak support | |||||||||||||||||||||
| Cppcheck Premium |
| premium-cert-msc30-c | ||||||||||||||||||||||
| CC2.MSC30 | Fully implemented | ||||||||||||||||||||||
| Helix QAC |
| C5022 C++5029 | ||||||||||||||||||||||
| Klocwork |
| CERT.MSC.STD_RAND_CALL | ||||||||||||||||||||||
| LDRA tool suite |
| 44 S | Enhanced enforcement | |||||||||||||||||||||
| Parasoft C/C++test |
| CERT_C-MSC30-a | Do not use the rand() function for generating pseudorandom numbers | |||||||||||||||||||||
| PC-lint Plus |
| 586 | Fully supported | |||||||||||||||||||||
| Polyspace Bug Finder |
| CERT C: Rule MSC30-C | Checks for vulnerable pseudo-random number generator (rule fully covered) | |||||||||||||||||||||
| RuleChecker | PRQA QA-C |
PRQA QA-C_v | PRQA QA-C_v | | 5022 | Fully implemented | PRQA QA-C++ | |||||||||||||||||
| Include Page | cplusplus:PRQA QA-C++_V | cplusplus:PRQA QA-C++_V | 5029 | RuleChecker | ||||||||||||||||||||
| Include Page | RuleChecker_V | RuleChecker_V |
| stdlib-use-rand | Fully checked | |||||||||||||||||||
| Security Reviewer - Static Reviewer |
| RTOS_07 | Fully implemented | stdlib-use-rand | Fully checked |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...
Key here for mapping notes
CWE-327 and MSC30-C
- CWE-327 forbids “broken or risky cryptographic algorithms” but does not specify what constitutes such an algo.
- Per CERT judgement, rand() qualifies, so:
- CWE-327 = Union( MSC30-C, list) where list =
- Invocation of broken/risky crypto algorithms besides rand()
CWE-338 and MSC30-C
CWE-338 = Union( MSC30-C, list) where list =
- Use of a weak PRNG besides standard C rand().
CWE-330 and MSC30-C
Independent( MSC30-C, MSC32-C, CON33-C)
...
MSC30-C, MSC32-C and CON33-C are independent, they have no intersections. They each specify distinct errors regarding PRNGs.
CWE-676 and MSC30-C
- Independent( ENV33-C, CON33-C, STR31-C, EXP33-C, MSC30-C, ERR34-C)
- MSC30-C implies that rand() is dangerous.
- CWE-676 = Union( MSC30-C, list) where list =
- Invocation of other dangerous functions, besides rand().
Bibliography
...