...
Recommendation | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
|---|---|---|---|---|---|---|
API00-C | Medium | Unlikely | No | HighNo | P2 | L3 |
Automated Detection
Tool | Version | Checker | Description | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Astrée |
| Supported | |||||||||||
| CodeSonar |
| LANG.STRUCT.UPD | Unchecked parameter dereference | ||||||||||
| Parasoft C/C++test |
| CODSTA-86 | |||||||||||
| Polyspace Bug Finder | R2016a | Invalid use of standard library memory routine Invalid use of standard library routine Invalid use of standard library string routine | Standard library memory function called with invalid arguments Wrong arguments to standard library function Standard library string function called with invalid arguments Argument to a standard function does not meet requirements for use in the function Defects related to code elements from an unsecure source | ||||||||||
CERT_C-API00-a | The validity of parameters must be checked inside each function | ||||||||||||
| PC-lint Plus |
| 413, 613, 668 | Partially supported: reports use of null pointers including function parameters which are assumed to have the potential to be null | ||||||||||
| PVS-Studio |
| V781, V1111 | PVS-Studio | 6.22 | V781 | General analysis rule
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...