Alternative functions that limit the number of bytes copied are often recommended to mitigate buffer overflow vulnerabilities. For example
strncpy()
instead of strcpy()
strncat()
instead of strcat()
fgets()
instead of gets()
snprintf()
instead of sprintf()
These functions truncate strings that exceed the specified limits. Additionally, some functions such as {{strncpy()}} do not guarantee that the resulting string is null terminated \[[STR32-C. Null-terminate byte strings as required]\]. |
Unintentional truncation results in a loss of data and, in some cases, leads to software vulnerabilities.
The standard functions strncpy()
and strncat()
copy a specified number n
characters from a source string to a destination array. If there is no null character in the first n
characters of the source array, the result will not be null terminated and any remaining characters are truncated.
char *string_data; char a[16]; /* ... */ strncpy(a, string_data, sizeof(a)); |
Either the strcpy()
or strncpy()
function can be used to copy a string and a null character to a destination buffer, provided there is enough space. Care must be taken to ensure that the destination buffer is large enough to hold the string to be copied and the null byte to prevent errors such as data truncation and buffer overflow.
char *string_data; char a[16]; if (string_data == NULL) { /* Handle null pointer error */ } else if (strlen(string_data) >= sizeof(a)) { /* Handle overlong string error */ } else { strcpy(a, string_data); } |
It is assumed that string_data
is null terminated. Otherwise, strlen()
will stray into other objects before finding a null byte.
The {{strcpy_s()}} function defined in \[[ISO/IEC TR 24731-1-2007|AA. C References#ISO/IEC TR 24731-1-2007]\] provides additional safeguards, including accepting the size of the destination buffer as an additional argument \[[STR07-A. Use TR 24731 for remediation of existing string manipulation code]\]. Also, {{strnlen_s()}} accepts a maximum-length argument for strings that may not be null terminated. |
char *string_data; char a[16]; if (string_data == NULL) { /* Handle null pointer error */ } else if (strnlen_s(string_data, sizeof(a)) >= sizeof(a)) { /* Handle overlong string error */ } else { strcpy_s(a, sizeof(a), string_data); } |
STR03-EX1: The intent of the programmer is to intentionally truncate the null-terminated byte string.
Truncating strings can lead to a loss of data.
Recommendation |
Severity |
Likelihood |
Remediation Cost |
Priority |
Level |
---|---|---|---|---|---|
STR03-A |
1 (low) |
1 (unlikely) |
2 (medium) |
P2 |
L3 |
The LDRA tool suite V 7.6.0 is able to detect violations of this recommendation.
Fortify SCA Version 5.0 with CERT C Rule Pack can detect violations of this recommendation.
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
\[[ISO/IEC 9899-1999|AA. C References#ISO/IEC 9899-1999]\] Section 7.21, "String handling <string.h>" \[[Seacord 05a|AA. C References#Seacord 05a]\] Chapter 2, "Strings" \[[ISO/IEC TR 24731-1-2007|AA. C References#ISO/IEC TR 24731-1-2007]\] |
STR02-A. Sanitize data passed to complex subsystems 07. Characters and Strings (STR) STR04-A. Use plain char for character data