File tree Expand file tree Collapse file tree 1 file changed +22
-22
lines changed
cpp/ql/src/Security/CWE/CWE-119 Expand file tree Collapse file tree 1 file changed +22
-22
lines changed Original file line number Diff line number Diff line change 1
- <!DOCTYPE qhelp PUBLIC
2
- "-//Semmle//qhelp//EN"
3
- "qhelp.dtd">
4
- <qhelp >
5
- <overview >
6
- <p >You must ensure that you do not exceed the size of an allocation during write and read operations.
7
- If an operation attempts to write to or access an element that is outside the range of the allocation then this results in a buffer overflow.
8
- Buffer overflows can lead to anything from a segmentation fault to a security vulnerability.
9
- </p >
1
+ <!DOCTYPE qhelp PUBLIC
2
+ "-//Semmle//qhelp//EN"
3
+ "qhelp.dtd">
4
+ <qhelp >
5
+ <overview >
6
+ <p >You must ensure that you do not exceed the size of an allocation during write and read operations.
7
+ If an operation attempts to write to or access an element that is outside the range of the allocation then this results in a buffer overflow.
8
+ Buffer overflows can lead to anything from a segmentation fault to a security vulnerability.
9
+ </p >
10
10
11
- </overview >
12
- <recommendation >
13
- <p >
14
- Check the offsets and sizes used in the highlighted operations to ensure that a buffer overflow will not occur.
15
- </p >
11
+ </overview >
12
+ <recommendation >
13
+ <p >
14
+ Check the offsets and sizes used in the highlighted operations to ensure that a buffer overflow will not occur.
15
+ </p >
16
16
17
- </recommendation >
18
- <example ><sample src =" OverrunWriteProductFlow.cpp" />
17
+ </recommendation >
18
+ <example ><sample src =" OverrunWriteProductFlow.cpp" />
19
19
20
20
21
21
22
- </example >
23
- <references >
22
+ </example >
23
+ <references >
24
24
25
- <li >I. Gerg. <em >An Overview and Example of the Buffer-Overflow Exploit</em >. IANewsletter vol 7 no 4. 2005.</li >
26
- <li >M. Donaldson. <em >Inside the Buffer Overflow Attack: Mechanism, Method & Prevention</em >. SANS Institute InfoSec Reading Room. 2002.</li >
25
+ <li >I. Gerg. <em >An Overview and Example of the Buffer-Overflow Exploit</em >. IANewsletter vol 7 no 4. 2005.</li >
26
+ <li >M. Donaldson. <em >Inside the Buffer Overflow Attack: Mechanism, Method & Prevention</em >. SANS Institute InfoSec Reading Room. 2002.</li >
27
27
28
- </references >
29
- </qhelp >
28
+ </references >
29
+ </qhelp >
You can’t perform that action at this time.
0 commit comments