Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/ipmiutil-3.1.7/lib/lanplus/asf.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_chassis.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_mc.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/helper.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_strings.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_channel.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_fru.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_lanp.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_event.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_firewall.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_sol.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_session.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_raw.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_hpmfwupg.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_picmg.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_main.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_user.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_intf.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_tsol.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_sunoem.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_fwum.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_oem.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_pef.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_sdr.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_constants.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/log.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_kontronoem.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/bswap.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_sensor.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_cc.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_entity.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_sel.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_isol.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/config.h
Examining data/ipmiutil-3.1.7/lib/lanplus/inc/inttypes-win.h
Examining data/ipmiutil-3.1.7/lib/lanplus/lanplus_strings.c
Examining data/ipmiutil-3.1.7/lib/lanplus/helper.c
Examining data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt_impl.h
Examining data/ipmiutil-3.1.7/lib/lanplus/rmcp.h
Examining data/ipmiutil-3.1.7/lib/lanplus/lanplus_dump.h
Examining data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt.h
Examining data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt_impl.c
Examining data/ipmiutil-3.1.7/lib/lanplus/lanplus_defs.h
Examining data/ipmiutil-3.1.7/lib/lanplus/lanplus.h
Examining data/ipmiutil-3.1.7/lib/lanplus/lanplus_dump.c
Examining data/ipmiutil-3.1.7/lib/lanplus/ipmi_strings.c
Examining data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt.c
Examining data/ipmiutil-3.1.7/lib/lanplus/lanplus.c
Examining data/ipmiutil-3.1.7/kern/alarms.h
Examining data/ipmiutil-3.1.7/hpiutil/hpifrub.c
Examining data/ipmiutil-3.1.7/hpiutil/hpievent.c
Examining data/ipmiutil-3.1.7/hpiutil/hpifrua.c
Examining data/ipmiutil-3.1.7/hpiutil/hpialarmpanel.c
Examining data/ipmiutil-3.1.7/hpiutil/hpireset.c
Examining data/ipmiutil-3.1.7/hpiutil/hpifru.c
Examining data/ipmiutil-3.1.7/hpiutil/SaHpi.h
Examining data/ipmiutil-3.1.7/hpiutil/hpisensor.c
Examining data/ipmiutil-3.1.7/hpiutil/hpiwdt.c
Examining data/ipmiutil-3.1.7/hpiutil/hpisel.c
Examining data/ipmiutil-3.1.7/util/iekanalyzer.h
Examining data/ipmiutil-3.1.7/util/ipmild.c
Examining data/ipmiutil-3.1.7/util/ipmilipmi.c
Examining data/ipmiutil-3.1.7/util/ipmidir.h
Examining data/ipmiutil-3.1.7/util/iuser.c
Examining data/ipmiutil-3.1.7/util/ipmilan2.c
Examining data/ipmiutil-3.1.7/util/iconfig.c
Examining data/ipmiutil-3.1.7/util/imbapi.c
Examining data/ipmiutil-3.1.7/util/oem_sun.h
Examining data/ipmiutil-3.1.7/util/ipmi_sample.c
Examining data/ipmiutil-3.1.7/util/oem_sun.c
Examining data/ipmiutil-3.1.7/util/ipicmg.h
Examining data/ipmiutil-3.1.7/util/ilan.c
Examining data/ipmiutil-3.1.7/util/oem_fujitsu.h
Examining data/ipmiutil-3.1.7/util/iseltime.c
Examining data/ipmiutil-3.1.7/util/oem_intel.c
Examining data/ipmiutil-3.1.7/util/isel.c
Examining data/ipmiutil-3.1.7/util/idcmi.c
Examining data/ipmiutil-3.1.7/util/ipmilanplus.h
Examining data/ipmiutil-3.1.7/util/imb_api.h
Examining data/ipmiutil-3.1.7/util/ipmilanplus.c
Examining data/ipmiutil-3.1.7/util/ihpm.h
Examining data/ipmiutil-3.1.7/util/md5.c
Examining data/ipmiutil-3.1.7/util/oem_kontron.h
Examining data/ipmiutil-3.1.7/util/ifru.h
Examining data/ipmiutil-3.1.7/util/isolwin.c
Examining data/ipmiutil-3.1.7/util/oem_hp.c
Examining data/ipmiutil-3.1.7/util/itsol.h
Examining data/ipmiutil-3.1.7/util/oem_quanta.c
Examining data/ipmiutil-3.1.7/util/oem_supermicro.c
Examining data/ipmiutil-3.1.7/util/icmd.c
Examining data/ipmiutil-3.1.7/util/ifirewall.h
Examining data/ipmiutil-3.1.7/util/isensor.c
Examining data/ipmiutil-3.1.7/util/oem_fujitsu.c
Examining data/ipmiutil-3.1.7/util/ireset.c
Examining data/ipmiutil-3.1.7/util/AnsiTerm.cpp
Examining data/ipmiutil-3.1.7/util/oem_newisys.c
Examining data/ipmiutil-3.1.7/util/idcmi.h
Examining data/ipmiutil-3.1.7/util/oem_lenovo.h
Examining data/ipmiutil-3.1.7/util/mem_if_cpp.cpp
Examining data/ipmiutil-3.1.7/util/ipmims.cpp
Examining data/ipmiutil-3.1.7/util/oem_dell.c
Examining data/ipmiutil-3.1.7/util/oem_asus.c
Examining data/ipmiutil-3.1.7/util/ifru.c
Examining data/ipmiutil-3.1.7/util/ipmi_port.c
Examining data/ipmiutil-3.1.7/util/ialarms.c
Examining data/ipmiutil-3.1.7/util/ipmilan.h
Examining data/ipmiutil-3.1.7/util/iwdt.c
Examining data/ipmiutil-3.1.7/util/subs.c
Examining data/ipmiutil-3.1.7/util/isol.c
Examining data/ipmiutil-3.1.7/util/ihealth.c
Examining data/ipmiutil-3.1.7/util/ifirewall.c
Examining data/ipmiutil-3.1.7/util/ipmimv.c
Examining data/ipmiutil-3.1.7/util/ipicmg.c
Examining data/ipmiutil-3.1.7/util/ipmilan.c
Examining data/ipmiutil-3.1.7/util/ipmi_sample_evt.c
Examining data/ipmiutil-3.1.7/util/ipmilan2.h
Examining data/ipmiutil-3.1.7/util/AnsiTerm.h
Examining data/ipmiutil-3.1.7/util/ifwum.h
Examining data/ipmiutil-3.1.7/util/ipmicmd.h
Examining data/ipmiutil-3.1.7/util/ipmidir.c
Examining data/ipmiutil-3.1.7/util/md2.c
Examining data/ipmiutil-3.1.7/util/oem_kontron.c
Examining data/ipmiutil-3.1.7/util/itsol.c
Examining data/ipmiutil-3.1.7/util/igetevent.c
Examining data/ipmiutil-3.1.7/util/ipmiutil.h
Examining data/ipmiutil-3.1.7/util/oem_dell.h
Examining data/ipmiutil-3.1.7/util/iekanalyzer.c
Examining data/ipmiutil-3.1.7/util/iserial.c
Examining data/ipmiutil-3.1.7/util/ipmiutil.c
Examining data/ipmiutil-3.1.7/util/ipmicmd.c
Examining data/ipmiutil-3.1.7/util/idiscover.c
Examining data/ipmiutil-3.1.7/util/md2.h
Examining data/ipmiutil-3.1.7/util/ifwum.c
Examining data/ipmiutil-3.1.7/util/isensor.h
Examining data/ipmiutil-3.1.7/util/oem_supermicro.h
Examining data/ipmiutil-3.1.7/util/oem_intel.h
Examining data/ipmiutil-3.1.7/util/ifruset.c
Examining data/ipmiutil-3.1.7/util/ipmibmc.c
Examining data/ipmiutil-3.1.7/util/ifru_picmg.c
Examining data/ipmiutil-3.1.7/util/mem_if.c
Examining data/ipmiutil-3.1.7/util/ievents.h
Examining data/ipmiutil-3.1.7/util/oem_lenovo.c
Examining data/ipmiutil-3.1.7/util/ihpm.c
Examining data/ipmiutil-3.1.7/util/ievents.c
Examining data/ipmiutil-3.1.7/test/dopanic_drv.c

FINAL RESULTS:

data/ipmiutil-3.1.7/hpiutil/hpifrub.c:182:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy ((char *)outstr, (char *)strptr->Data);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:474:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(poststr,"hang, %s",fwstat[i].msg);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:480:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(poststr,"prog, %s",fwstat[i].msg);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:501:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(mystr,"%s",slot_str[i]);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:530:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(outbuf,
data/ipmiutil-3.1.7/hpiutil/hpisel.c:536:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		    sprintf(outbuf,
data/ipmiutil-3.1.7/hpiutil/hpisel.c:590:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(outbuf,genstr);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:636:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(estag,eventstates[esi].str);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:656:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(outbuf,"%s %s", estag, sbuf); 
data/ipmiutil-3.1.7/hpiutil/hpisel.c:659:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(outbuf,"%s, %s %s %x [%02x %02x %02x]", 
data/ipmiutil-3.1.7/hpiutil/hpisel.c:718:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(outbuf,"%04x %s %s ", sel->EntryId, timestr, evtypes[evtype] );
data/ipmiutil-3.1.7/hpiutil/hpisel.c:746:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(&outbuf[outlen], "%s, %x %x, %02x %02x %02x [%02x %02x %02x/%02x]",
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:83:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else strcpy(ustr, usedesc[wdt->TimerUse]);
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:85:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  else strcpy(astr, actions[wdt->TimerAction]);
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/helper.h:40:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf   _snprintf
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/helper.h:40:20:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf   _snprintf
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/helper.h:41:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define vsnprintf  _vsnprintf
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_fru.h:69:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	uint8_t access:1;
data/ipmiutil-3.1.7/util/ialarms.c:178:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
       if (val & mask) printf(enc_pattn,i,"ON");
data/ipmiutil-3.1.7/util/ialarms.c:179:13:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
       else printf(enc_pattn,i,"off");
data/ipmiutil-3.1.7/util/icmd.c:232:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                printf(usagemsg, progname);
data/ipmiutil-3.1.7/util/icmd.c:361:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(usagemsg, progname);
data/ipmiutil-3.1.7/util/iconfig.c:98:28:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define SELprintf          printf
data/ipmiutil-3.1.7/util/iconfig.c:460:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
static int SetChanAcc(uchar chan, uchar parm, uchar val, uchar access)
data/ipmiutil-3.1.7/util/iconfig.c:473:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	inputData[2] = (parm & 0xc0) | access; /* set priv level */
data/ipmiutil-3.1.7/util/iconfig.c:1096:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
           strcpy(ifname0,szDeviceName);
data/ipmiutil-3.1.7/util/iconfig.c:1097:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
           strcpy(ifpattn,szDeviceName);
data/ipmiutil-3.1.7/util/iconfig.c:1115:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( szDeviceName, "%s%d", ifpattn, nCurDevice );
data/ipmiutil-3.1.7/util/iconfig.c:1116:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(ifr.ifr_name, szDeviceName );
data/ipmiutil-3.1.7/util/iconfig.c:1343:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(arping_cmd,
data/ipmiutil-3.1.7/util/iconfig.c:1347:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      i = system(arping_cmd);
data/ipmiutil-3.1.7/util/iconfig.c:1810:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(keyret, key);  /*has keyword and params*/
data/ipmiutil-3.1.7/util/iconfig.c:1811:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(value, val);   /*has list of hex values*/
data/ipmiutil-3.1.7/util/iconfig.c:1875:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(passwordData,optarg);
data/ipmiutil-3.1.7/util/iconfig.c:2065:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
       else sprintf(ifname,"%s%d",ifpattn,i);
data/ipmiutil-3.1.7/util/iconfig.c:2542:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(&pc[2],passwordData);
data/ipmiutil-3.1.7/util/iconfig.c:2557:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(&pc[2],passwordData);
data/ipmiutil-3.1.7/util/idiscover.c:234:4:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
   vfprintf(fderr, pattn, arglist);
data/ipmiutil-3.1.7/util/idiscover.c:257:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(strbuf,"LastError = %d  %s",rv,desc);
data/ipmiutil-3.1.7/util/idiscover.c:411:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(ifname,ifa->ifa_name);
data/ipmiutil-3.1.7/util/idiscover.c:462:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		 strcpy(g_startDest,temp_start);
data/ipmiutil-3.1.7/util/idiscover.c:463:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		 strcpy(g_endDest,temp_start);
data/ipmiutil-3.1.7/util/idiscover.c:505:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(ifr.ifr_name, devname);
data/ipmiutil-3.1.7/util/idiscover.c:512:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
             strcpy(g_interface, devname);  
data/ipmiutil-3.1.7/util/idiscover.c:519:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		 strcpy(g_startDest,temp_start);
data/ipmiutil-3.1.7/util/idiscover.c:520:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		 strcpy(g_endDest,temp_start);
data/ipmiutil-3.1.7/util/idiscover.c:553:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		 strcpy(g_startDest,temp_start);
data/ipmiutil-3.1.7/util/idiscover.c:554:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		 strcpy(g_endDest,temp_start);
data/ipmiutil-3.1.7/util/idiscover.c:1030:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(g_endDest,g_startDest);   /*only one IP address*/
data/ipmiutil-3.1.7/util/iekanalyzer.c:543:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                  strcpy(filename[type_offset],
data/ipmiutil-3.1.7/util/iekanalyzer.c:661:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                     strcpy( filename[i], &argv[index][SIZE_OF_FILE_TYPE] );
data/ipmiutil-3.1.7/util/iekanalyzer.h:141:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	uint8_t access:1;
data/ipmiutil-3.1.7/util/ievents.c:76:21:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define  SELprintf  printf  
data/ipmiutil-3.1.7/util/ievents.c:653:28:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    if (bdata == 0xFF) n = sprintf(desc,DIMM_UNKNOWN);
data/ipmiutil-3.1.7/util/ievents.c:654:14:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    else n = sprintf(desc,DIMM_NUM,dimm);
data/ipmiutil-3.1.7/util/ievents.c:804:27:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   if (bdata == 0xFF) n = sprintf(desc,DIMM_UNKNOWN);
data/ipmiutil-3.1.7/util/ievents.c:808:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
      n = sprintf(desc,DIMM_NUM,dimm);
data/ipmiutil-3.1.7/util/ievents.c:813:27:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
         if (rv != 0) n = sprintf(desc,DIMM_NUM,dimm);
data/ipmiutil-3.1.7/util/ievents.c:872:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	else sprintf(stype_desc,"%s(%02x)",sensor_types[i],stype); /*reserved*/
data/ipmiutil-3.1.7/util/ievents.c:1152:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	    strcpy(sensdesc,p);
data/ipmiutil-3.1.7/util/ievents.c:1371:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(pstr,"%s",pwrunit_evts[i].msg);
data/ipmiutil-3.1.7/util/ievents.c:1411:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(pstr,"%s",redund_evts[i].msg);
data/ipmiutil-3.1.7/util/ievents.c:1433:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(pstr,"%s",present_str[i]);
data/ipmiutil-3.1.7/util/ievents.c:1438:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(pstr,"%s",present_str[i]);
data/ipmiutil-3.1.7/util/ievents.c:1558:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		     sprintf(outbuf,"%04x %c %s %c %s %c %02x %c OEM Event ",
data/ipmiutil-3.1.7/util/ievents.c:1562:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		     sprintf(outbuf,"%04x %s %s %02x OEM Event ", 
data/ipmiutil-3.1.7/util/ievents.c:1583:22:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                     sprintf(outbuf,"%04x %c %s %c %s %c %02x %c %06x %c %s %c OEM Event ",
data/ipmiutil-3.1.7/util/ievents.c:1588:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		     sprintf(outbuf,"%04x %s %s %02x %06x %s OEM Event ", 
data/ipmiutil-3.1.7/util/ievents.c:1608:22:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                     sprintf(outbuf,"%04x %c %s %c %s %c %02x %c %06x %c %s %c OEM Event ",
data/ipmiutil-3.1.7/util/ievents.c:1613:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		     sprintf(outbuf,"%04x %s %s %02x %06x %s OEM Event ", 
data/ipmiutil-3.1.7/util/ievents.c:1634:22:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                     sprintf(outbuf,"%04x %c %s %c %s %c %02x %c %s %c %s %c OEM Event ",
data/ipmiutil-3.1.7/util/ievents.c:1639:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		     sprintf(outbuf,"%04x %s %02x OEM Event ", 
data/ipmiutil-3.1.7/util/ievents.c:1670:22:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                     sprintf(outbuf,"%04x %c %s %c %s %c %02x %c %02x%02x%02x %c %s %c OEM Event ",
data/ipmiutil-3.1.7/util/ievents.c:1675:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		     sprintf(outbuf,"%04x %s %s %02x %02x%02x%02x OEM Event ", 
data/ipmiutil-3.1.7/util/ievents.c:1758:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			  sprintf(mystr,"%s",proc_str[i]);
data/ipmiutil-3.1.7/util/ievents.c:1763:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			  sprintf(mystr,"%s deasserted",proc_str[i]);
data/ipmiutil-3.1.7/util/ievents.c:1780:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			  sprintf(mystr,"%s on %s",p1,p2);
data/ipmiutil-3.1.7/util/ievents.c:1846:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			     sprintf(mystr,"%s%c %s",mem_str(i),bcomma,mdesc);
data/ipmiutil-3.1.7/util/ievents.c:1850:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			     sprintf(mystr,"%s%c %s",mem_str(i),bcomma,mdesc);
data/ipmiutil-3.1.7/util/ievents.c:1853:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			     sprintf(mystr,"%s%c %s",mem_str(i),bcomma,mdesc);
data/ipmiutil-3.1.7/util/ievents.c:1872:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(poststr,"hang%c %s",bcomma,
data/ipmiutil-3.1.7/util/ievents.c:1880:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(poststr,"prog%c %s",bcomma,
data/ipmiutil-3.1.7/util/ievents.c:1917:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			    sprintf(mystr,"%s (on %02x:%02x.%d)",
data/ipmiutil-3.1.7/util/ievents.c:1955:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(mystr,"%s",slot_str[i]);
data/ipmiutil-3.1.7/util/ievents.c:1962:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(mystr,"%s",acpip_str[i]);
data/ipmiutil-3.1.7/util/ievents.c:1989:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(mystr,"%s",batt_clr[i]);
data/ipmiutil-3.1.7/util/ievents.c:1991:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				sprintf(mystr,"%s",batt_str[i]);
data/ipmiutil-3.1.7/util/ievents.c:2001:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(mystr,"%s User%d",audit_str[i],
data/ipmiutil-3.1.7/util/ievents.c:2011:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			sprintf(mystr,"%s",nm_str[i]);
data/ipmiutil-3.1.7/util/ievents.c:2021:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				   sprintf(&mystr[n],
data/ipmiutil-3.1.7/util/ievents.c:2024:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
				   sprintf(&mystr[n],
data/ipmiutil-3.1.7/util/ievents.c:2033:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(mystr,cstr); /*", "*/
data/ipmiutil-3.1.7/util/ievents.c:2034:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(mystr,nmh_str[j]);
data/ipmiutil-3.1.7/util/ievents.c:2039:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(mystr,cstr); /*", "*/
data/ipmiutil-3.1.7/util/ievents.c:2040:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				strcat(mystr,nmfw_str[j]);
data/ipmiutil-3.1.7/util/ievents.c:2134:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		          sprintf(datastr, "actual=%.2f %s, threshold=%.2f %s",
data/ipmiutil-3.1.7/util/ievents.c:2162:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		   sprintf(outbuf,"%04x Type%02x %s ", 
data/ipmiutil-3.1.7/util/ievents.c:2167:4:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
			strcat(outbuf,mystr);
data/ipmiutil-3.1.7/util/ifru.c:527:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   else sprintf(devstr,"[%s,   %02x] ",FruTypeString(frutype,frudev),frudev);
data/ipmiutil-3.1.7/util/ifru.c:686:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(mystr,"%sMulti[%d] ",tag,midx);
data/ipmiutil-3.1.7/util/ifru.c:831:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   else sprintf(devstr,"[%s,%02x,%02x] ",pstr,sa,frudev);
data/ipmiutil-3.1.7/util/ifru.c:2004:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   else sprintf(devstr,"[%s,%02x,%02x] ", /*was by g_frutype*/
data/ipmiutil-3.1.7/util/ifruset.c:465:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   else sprintf(devstr,"[%s,%02x] ",FruTypeString(frutype),frudev);
data/ipmiutil-3.1.7/util/ifruset.c:551:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(mystr,"%sMulti[%d] ",tag,midx);
data/ipmiutil-3.1.7/util/ifruset.c:696:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   else sprintf(devstr,"[%s,%02x] ",pstr,frudev);
data/ipmiutil-3.1.7/util/ifruset.c:1569:14:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        else sprintf(devstr,"[%s,%02x] ",FruTypeString(g_frutype),g_fruid);
data/ipmiutil-3.1.7/util/ifwum.c:265:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy((char *)fileName, argv[1]);
data/ipmiutil-3.1.7/util/ifwum.c:287:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
               strcpy((char *)fileName, argv[1]);
data/ipmiutil-3.1.7/util/igetevent.c:328:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf( fdout, pattn, arglist );
data/ipmiutil-3.1.7/util/igetevent.c:466:17:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
           rv = system(run_script);
data/ipmiutil-3.1.7/util/igetevent.c:477:17:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
           rv = system(SHUTDOWN_CMD);
data/ipmiutil-3.1.7/util/igetevent.c:487:17:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
           rv = system(REBOOT_CMD);
data/ipmiutil-3.1.7/util/igetevent.c:706:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(evtmethod,methodstr[method]); 
data/ipmiutil-3.1.7/util/igetevent.c:1186:10:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	        sprintf(idxfile,"%s\\%s",ipath,"\\",IDXFILE);
data/ipmiutil-3.1.7/util/igetevent.c:1196:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          strcat(idxfile,node);
data/ipmiutil-3.1.7/util/igetevent.c:1198:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          strcat(idxfile2,node);
data/ipmiutil-3.1.7/util/igetevent.c:1200:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          strcat(outfile,node);
data/ipmiutil-3.1.7/util/igetevent.c:1361:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		   ret = system(run_script);
data/ipmiutil-3.1.7/util/igetevent.c:1368:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		   ret = system(SHUTDOWN_CMD);
data/ipmiutil-3.1.7/util/igetevent.c:1373:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		   ret = system(REBOOT_CMD);
data/ipmiutil-3.1.7/util/igetevent.c:1402:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(outbuf,"igetevent waiting for events via method %d (%s)\n",
data/ipmiutil-3.1.7/util/igetevent.c:1421:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(run_cmd,"%s \"%s\"\n",run_script,outbuf);
data/ipmiutil-3.1.7/util/igetevent.c:1422:7:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		j = system(run_cmd);
data/ipmiutil-3.1.7/util/ihealth.c:154:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(cmd,"dmidecode | grep -A6 \"^Base Board\" |grep 'Product Name' |cut -f2 -d':' |awk '{ print $1 }' >%s",dmitmp);
data/ipmiutil-3.1.7/util/ihealth.c:155:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   rv = system(cmd); 
data/ipmiutil-3.1.7/util/ihealth.c:367:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(pstr,"%s",(state & 0x01) ? "on" : "off");
data/ipmiutil-3.1.7/util/ihealth.c:1052:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
           sprintf(selfstr,"%s",s);
data/ipmiutil-3.1.7/util/ihealth.c:1058:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	      sprintf(selfstr,"%s, last = %02x%02x",s,selfbuf[1],selfbuf[0]);
data/ipmiutil-3.1.7/util/ihealth.c:1059:12:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	   } else sprintf(selfstr,"%s",s);
data/ipmiutil-3.1.7/util/ihpm.c:1160:5:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    scanf("%s",userInput);
data/ipmiutil-3.1.7/util/ihpm.c:1411:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy((char *)&gVersionInfo[componentId].descString,
data/ipmiutil-3.1.7/util/ilan.c:206:28:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define SELprintf          printf
data/ipmiutil-3.1.7/util/ilan.c:830:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy ((char *) &inputData[2], upswd);
data/ipmiutil-3.1.7/util/ilan.c:862:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy ((char *) &inputData[2], upswd);
data/ipmiutil-3.1.7/util/ilan.c:1013:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (uname, responseData);
data/ipmiutil-3.1.7/util/ilan.c:2241:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (ifpattn, szDeviceName);
data/ipmiutil-3.1.7/util/ilan.c:2257:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (szDeviceName, "%s%d", ifpattn, nCurDevice);	/*eth%d */
data/ipmiutil-3.1.7/util/ilan.c:2259:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (ifr.ifr_name, szDeviceName);
data/ipmiutil-3.1.7/util/ilan.c:2280:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (ifr.ifr_name, szDeviceName);
data/ipmiutil-3.1.7/util/ilan.c:2315:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf (ifname, "%s%d", ifpattn, devnum);	/*eth%d */
data/ipmiutil-3.1.7/util/ilan.c:2319:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (ifname, szDeviceName);
data/ipmiutil-3.1.7/util/ilan.c:2584:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (arping_cmd,
data/ipmiutil-3.1.7/util/ilan.c:2590:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (arping_cmd,
data/ipmiutil-3.1.7/util/ilan.c:2601:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system (arping_cmd);
data/ipmiutil-3.1.7/util/ilan.c:2656:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (arping_cmd,
data/ipmiutil-3.1.7/util/ilan.c:2662:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (arping_cmd,
data/ipmiutil-3.1.7/util/ilan.c:2673:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system (arping_cmd);
data/ipmiutil-3.1.7/util/ilan.c:2737:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (arping_cmd,
data/ipmiutil-3.1.7/util/ilan.c:2742:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (arping_cmd,
data/ipmiutil-3.1.7/util/ilan.c:2753:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    ret = system (arping_cmd);
data/ipmiutil-3.1.7/util/ilan.c:3092:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf (rtcmd, "netstat -r -n |grep default |awk '{ print $2 }' >%s",
data/ipmiutil-3.1.7/util/ilan.c:3094:3:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  system (rtcmd);
data/ipmiutil-3.1.7/util/ilan.c:3132:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      num = sscanf (buff, rtfmt,
data/ipmiutil-3.1.7/util/ilan.c:3188:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf (ifname, "%s%d", ifpattn, i);
data/ipmiutil-3.1.7/util/ilan.c:3194:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (ifr.ifr_name, _ifname);
data/ipmiutil-3.1.7/util/ilan.c:3230:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (ifr.ifr_name, _ifname);
data/ipmiutil-3.1.7/util/ilan.c:3252:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (ifr.ifr_name, _ifname);
data/ipmiutil-3.1.7/util/ilan.c:3345:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (rgcommunity, &buff[i]);
data/ipmiutil-3.1.7/util/ilan.c:3346:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (defcommunity, &buff[i]);
data/ipmiutil-3.1.7/util/ilan.c:3384:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	  strcpy (rgcommunity, defcommunity);
data/ipmiutil-3.1.7/util/ilan.c:3442:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  uchar access;
data/ipmiutil-3.1.7/util/ilan.c:3464:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch (access & 0x03) {
data/ipmiutil-3.1.7/util/ilan.c:3478:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access & 0x20)
data/ipmiutil-3.1.7/util/ilan.c:4001:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy (pdesc, pefdesc[idx]);	/* if Intel, pre-defined */
data/ipmiutil-3.1.7/util/ilan.c:4172:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (ifname, optarg);
data/ipmiutil-3.1.7/util/ilan.c:4314:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (rghostname, optarg);
data/ipmiutil-3.1.7/util/ilan.c:4321:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (rgcommunity, optarg);
data/ipmiutil-3.1.7/util/ilan.c:4333:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy (passwordData, optarg);
data/ipmiutil-3.1.7/util/ilan.c:4579:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf (ifname, "%s%d", ifpattn, i);	/*eth%d */
data/ipmiutil-3.1.7/util/ilan.c:5828:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy ((char *) &LanRecord.data[0], rgcommunity);
data/ipmiutil-3.1.7/util/imbapi.c:99:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf( fdlog, pattn, arglist );
data/ipmiutil-3.1.7/util/imbapi.c:2476:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf,"%s %s: open(%s) failed",
data/ipmiutil-3.1.7/util/imbapi.c:2497:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf,"%s %s: mmap failed", __FILE__,__FUNCTION__);
data/ipmiutil-3.1.7/util/imbapi.c:2539:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(buf,"%s %s: munmap failed", __FILE__,__FUNCTION__);
data/ipmiutil-3.1.7/util/ipmi_sample.c:187:11:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
      n = fscanf(fp,"%s %s %s", nod, usr, psw);
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:106:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf( fdout, pattn, arglist );
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:393:2:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	sprintf(outbuf,"%s ver %s started\n", progname,progver);
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:396:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(outbuf,"%s reading sensors ...\n",progname);
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:406:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          strcat(idxfile,node);
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:408:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          strcat(outfile,node);
data/ipmiutil-3.1.7/util/ipmicmd.c:1304:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (node != NULL) strcpy(node,lanp.node);
data/ipmiutil-3.1.7/util/ipmicmd.c:1305:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (user != NULL) strcpy(user,lanp.user);
data/ipmiutil-3.1.7/util/ipmicmd.c:1306:22:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   if (pswd != NULL) strcpy(pswd,lanp.pswd);
data/ipmiutil-3.1.7/util/ipmicmd.h:58:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/ipmiutil-3.1.7/util/ipmicmd.h:58:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/ipmiutil-3.1.7/util/ipmidir.c:141:45:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DBGP(fmt, args...)   if (fdebugdir) fprintf(stdout,fmt, ##args)
data/ipmiutil-3.1.7/util/ipmidir.c:145:46:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DBGP2(fmt, args...)   if (fdebugdir) fprintf(stderr,fmt, ##args)
data/ipmiutil-3.1.7/util/ipmilan.c:218:18:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define dbglog   printf
data/ipmiutil-3.1.7/util/ipmilan.c:1720:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	} else strcpy(nodename, node);
data/ipmiutil-3.1.7/util/ipmilan.c:1727:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(gnodename,nodename);
data/ipmiutil-3.1.7/util/ipmilanplus.c:25:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/ipmiutil-3.1.7/util/ipmilanplus.c:25:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/ipmiutil-3.1.7/util/ipmilanplus.c:306:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            if (node != NULL) { strcpy(intf->session->hostname,node); }
data/ipmiutil-3.1.7/util/ipmilanplus.c:307:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            if (user != NULL) { strcpy(intf->session->username,user); }
data/ipmiutil-3.1.7/util/ipmimv.c:239:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf( fpdbg, pattn, arglist );
data/ipmiutil-3.1.7/util/ipmiutil.c:190:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	 ret = system("ls /sbin/chkconfig >/dev/null 2>&1");
data/ipmiutil-3.1.7/util/ipmiutil.c:194:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(mycmd,"service %s stop\n",psvc);
data/ipmiutil-3.1.7/util/ipmiutil.c:196:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	    ret = system(mycmd);
data/ipmiutil-3.1.7/util/ipmiutil.c:198:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	       sprintf(mycmd,"/sbin/chkconfig --del %s\n",psvc);
data/ipmiutil-3.1.7/util/ipmiutil.c:200:15:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	       ret = system(mycmd);
data/ipmiutil-3.1.7/util/ipmiutil.c:204:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(mycmd,"/sbin/chkconfig --add %s\n",psvc);
data/ipmiutil-3.1.7/util/ipmiutil.c:206:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		ret = system(mycmd);
data/ipmiutil-3.1.7/util/ipmiutil.c:207:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(mycmd,"/sbin/chkconfig --level 345 %s on\n",psvc);
data/ipmiutil-3.1.7/util/ipmiutil.c:209:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		ret = system(mycmd);
data/ipmiutil-3.1.7/util/ipmiutil.c:211:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	    sprintf(mycmd,"service %s start\n",psvc);
data/ipmiutil-3.1.7/util/ipmiutil.c:213:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	    ret = system(mycmd);
data/ipmiutil-3.1.7/util/ipmiutil.c:227:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(tag,"%s %s",progname,psubcmd);
data/ipmiutil-3.1.7/util/ireset.c:380:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(initmsg,"%s: soft shutdown -%c initiated\n",progname,shutchar);
data/ipmiutil-3.1.7/util/ireset.c:383:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(initcmd,"shutdown -%c -c %s",shutchar,progname);
data/ipmiutil-3.1.7/util/ireset.c:384:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		status = system(initcmd); /* do the OS shutdown */
data/ipmiutil-3.1.7/util/ireset.c:388:12:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
		status = system(initcmd); /* do the OS shutdown */
data/ipmiutil-3.1.7/util/ireset.c:405:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	 sprintf(initmsg,"%s: chassis %s\n",progname,reset_str(bpower,bootopt));
data/ipmiutil-3.1.7/util/isel.c:130:21:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define  SELprintf  printf
data/ipmiutil-3.1.7/util/isel.c:765:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	     sprintf(idxfile,"%s\\%s",ipath,IDXFILE);
data/ipmiutil-3.1.7/util/isel.c:791:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(idxfile,node);
data/ipmiutil-3.1.7/util/isel.c:793:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(idxfile2,node);
data/ipmiutil-3.1.7/util/isel.c:804:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
           strcat(idxfile,gstr);
data/ipmiutil-3.1.7/util/isel.c:806:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
           strcat(idxfile2,gstr);
data/ipmiutil-3.1.7/util/iseltime.c:293:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      c = system("echo \"Current RTC time:    `hwclock`\"");
data/ipmiutil-3.1.7/util/iseltime.c:295:14:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
         c = system("hwclock --systohc");
data/ipmiutil-3.1.7/util/isensor.c:709:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(cstr,"arm=%s thr=%s evts=%s",arm,thr,evt);
data/ipmiutil-3.1.7/util/isensor.c:2046:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%shi-unrec %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2047:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2051:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%shi-crit %.2f ", sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2052:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2056:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%shi-noncr %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2057:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2061:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%slo-noncr %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2062:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2066:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%slo-crit %.2f ", sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2067:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2071:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%slo-unrec %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2072:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2084:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%shi-unrec %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2085:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2089:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%shi-crit %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2090:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2094:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%shi-noncr %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2095:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2099:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%slo-noncr %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2100:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2104:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%slo-crit %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2105:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2109:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%slo-unrec %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2110:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2118:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%snom %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2119:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2121:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%snmax %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2122:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2124:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%snmin %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2125:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2128:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%ssmax %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2129:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2132:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%ssmin %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2133:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2137:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%s+hyst %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2138:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2141:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(part,"%s-hyst %.2f ",sep,ival);
data/ipmiutil-3.1.7/util/isensor.c:2142:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
		strcat(str,part);
data/ipmiutil-3.1.7/util/isensor.c:2398:8:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		     sprintf(customstr,"%s %s",
data/ipmiutil-3.1.7/util/isensor.c:2461:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	   sprintf(customstr,"%s", sensor_dstatus[istr]);
data/ipmiutil-3.1.7/util/iserial.c:121:28:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define SELprintf          printf
data/ipmiutil-3.1.7/util/iserial.c:782:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void ShowChanAccess(uchar chan, char *tag, uchar access, uchar access2)
data/ipmiutil-3.1.7/util/iserial.c:785:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		chan,tag,bdelim,access,access2,bdelim);
data/ipmiutil-3.1.7/util/iserial.c:786:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access & 0x03) {
data/ipmiutil-3.1.7/util/iserial.c:793:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access & 0x20) printf("PEF Alerts Disabled\n"); /*0*/
data/ipmiutil-3.1.7/util/iserial.c:1277:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	uchar access;
data/ipmiutil-3.1.7/util/iserial.c:1319:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		ret,access);
data/ipmiutil-3.1.7/util/iserial.c:1353:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
         ret = SetChanAcc(ser_ch, 0x80, access);  
data/ipmiutil-3.1.7/util/iserial.c:1355:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
         ret = SetChanAcc(ser_ch, 0x40, access);
data/ipmiutil-3.1.7/util/iserial.c:1361:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		   ret,access);
data/ipmiutil-3.1.7/util/iserial.c:1366:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
		ret,access);
data/ipmiutil-3.1.7/util/iserial.c:1367:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
         ShowChanAccess(ser_ch,"ser",access,SerRecord.data[1]);
data/ipmiutil-3.1.7/util/isol.c:309:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(fp, pattn, arglist);
data/ipmiutil-3.1.7/util/isol.c:332:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(fp, pattn, arglist);
data/ipmiutil-3.1.7/util/isol.c:342:5:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    vsnprintf(logtmp, LOG_MSG_LENGTH, pattn, arglist);
data/ipmiutil-3.1.7/util/mem_if.c:675:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			          strcpy(bankstr,(char *)&VirtualAddress[k]);
data/ipmiutil-3.1.7/util/mem_if.c:679:14:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			          strcpy(dimmstr,(char *)&VirtualAddress[k]);
data/ipmiutil-3.1.7/util/mem_if.c:685:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
			   sprintf(desc,"%s/%s",bankstr,dimmstr);
data/ipmiutil-3.1.7/util/oem_dell.c:2629:33:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                                printf(INVAILD_FAILOVER_MODE_STRING);
data/ipmiutil-3.1.7/util/oem_dell.c:2632:33:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                                printf(INVAILD_FAILOVER_MODE_SET);
data/ipmiutil-3.1.7/util/oem_dell.c:2635:33:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                                printf(INVAILD_SHARED_MODE_SET_STRING);
data/ipmiutil-3.1.7/util/oem_dell.c:2651:14:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        	    printf(INVAILD_SHARED_MODE_SET_STRING);
data/ipmiutil-3.1.7/util/oem_dell.c:3365:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(strTime,temp);
data/ipmiutil-3.1.7/util/oem_dell.c:4701:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        fru.size, fru.access ? "words" : "bytes");
data/ipmiutil-3.1.7/util/oem_dell.c:5588:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
														strcat(desc,tmpdesc);
data/ipmiutil-3.1.7/util/oem_dell.c:5592:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
														strcat(desc,tmpdesc);
data/ipmiutil-3.1.7/util/oem_dell.c:5596:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
														strcat(desc,tmpdesc);
data/ipmiutil-3.1.7/util/oem_dell.c:5600:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
														strcat(desc,tmpdesc);
data/ipmiutil-3.1.7/util/oem_dell.c:5611:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
										strcat(desc,tmpdesc);
data/ipmiutil-3.1.7/util/oem_dell.c:5663:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
						strcat(desc, tmpdesc);
data/ipmiutil-3.1.7/util/oem_dell.c:5670:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
							strcat(desc, tmpdesc);
data/ipmiutil-3.1.7/util/oem_dell.c:5685:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
						strcat(desc, tmpdesc);
data/ipmiutil-3.1.7/util/oem_dell.c:5714:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
							strcat(str,dimmStr);
data/ipmiutil-3.1.7/util/oem_dell.c:5737:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
				            strcat(str, dimmStr);
data/ipmiutil-3.1.7/util/oem_dell.c:5831:6:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
					strcat(desc,tmpdesc);
data/ipmiutil-3.1.7/util/oem_dell.c:5844:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
						strcat(desc,tmpdesc);
data/ipmiutil-3.1.7/util/oem_dell.c:5846:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
						strcat(desc,tmpdesc);
data/ipmiutil-3.1.7/util/oem_dell.c:5850:8:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
							strcat(desc,tmpdesc);
data/ipmiutil-3.1.7/util/oem_dell.c:5860:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
						strcat(desc,tmpdesc);
data/ipmiutil-3.1.7/util/oem_dell.c:5869:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
						strcat(desc,tmpdesc);
data/ipmiutil-3.1.7/util/oem_dell.c:5879:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
						sprintf(desc,"%s","IO channel Check NMI");
data/ipmiutil-3.1.7/util/oem_dell.c:5909:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
						strcat(desc,tmpdesc);
data/ipmiutil-3.1.7/util/oem_dell.h:247:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        uint8_t access:1;
data/ipmiutil-3.1.7/util/oem_intel.c:468:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   ret = system(tam1cmd);
data/ipmiutil-3.1.7/util/oem_intel.c:477:14:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	      ret = system(tam2cmd);
data/ipmiutil-3.1.7/util/oem_intel.c:1115:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        if (bdata == 0xFF) n = sprintf(desc,DIMM_UNKNOWN);  /* invalid */
data/ipmiutil-3.1.7/util/oem_intel.c:1116:18:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        else n = sprintf(desc,DIMM_NUM,dimm);
data/ipmiutil-3.1.7/util/oem_intel.c:1740:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
       printf(enc_pattn,i,pstat,pover);
data/ipmiutil-3.1.7/util/oem_intel.c:1867:8:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
       printf(enc_pattn,i,pstat,pover);
data/ipmiutil-3.1.7/util/oem_kontron.c:1007:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
		sprintf(oembuf,"%s/%s",p1,p2);
data/ipmiutil-3.1.7/util/oem_kontron.h:61:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        uint8_t access:1;
data/ipmiutil-3.1.7/util/oem_supermicro.c:573:14:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
         n = sprintf(desc,DIMM_UNKNOWN);  /* invalid */
data/ipmiutil-3.1.7/util/oem_supermicro.c:583:42:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
   if ((bdata == 0xFF) || (rv != 0)) n = sprintf(desc,DIMM_UNKNOWN);  
data/ipmiutil-3.1.7/util/subs.c:91:28:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
       if (newstr != NULL) strcpy(newstr,instr);
data/ipmiutil-3.1.7/util/subs.c:139:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(fp, format, vptr);
data/ipmiutil-3.1.7/util/subs.c:144:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        vsnprintf(logtmp, LOG_MSG_LENGTH, format, vptr);
data/ipmiutil-3.1.7/util/subs.c:161:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(fp, format, vptr);
data/ipmiutil-3.1.7/util/subs.c:313:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	 sprintf(log_name,"%s.log",pname);
data/ipmiutil-3.1.7/util/subs.c:315:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	 sprintf(log_name,"%s.log",pname);
data/ipmiutil-3.1.7/util/subs.c:318:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
	 sprintf(log_name,"/var/log/%s.log",pname);
data/ipmiutil-3.1.7/util/subs.c:348:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf( fplog, pattn, arglist );
data/ipmiutil-3.1.7/util/subs.c:368:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf( fp, pattn, arglist );
data/ipmiutil-3.1.7/hpiutil/hpialarmpanel.c:99:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ( (c = getopt( argc, argv,"rxa:b:c:m:n:p:i:d:o?")) != EOF )
data/ipmiutil-3.1.7/hpiutil/hpievent.c:489:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ( (c = getopt( argc, argv,"ms:xz?")) != EOF )
data/ipmiutil-3.1.7/hpiutil/hpifrua.c:333:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ( (c = getopt( argc, argv,"a:xz?")) != EOF )
data/ipmiutil-3.1.7/hpiutil/hpifrub.c:475:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ( (c = getopt( argc, argv,"a:vxz?")) != EOF )
data/ipmiutil-3.1.7/hpiutil/hpireset.c:92:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ( (c = getopt( argc, argv,"rdx?")) != EOF )
data/ipmiutil-3.1.7/hpiutil/hpisel.c:836:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ( (c = getopt( argc, argv, ARGSTR)) != EOF )
data/ipmiutil-3.1.7/hpiutil/hpisensor.c:370:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ( (c = getopt( argc, argv,"tx?")) != EOF )
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:134:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
  while ( (c = getopt( argc, argv,"dert:x?")) != EOF )
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt_impl.c:57:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   envpath = getenv("USERPROFILE");
data/ipmiutil-3.1.7/util/ialarms.c:371:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt( argc, argv,"rxa:b:c:d:efm:n:p:i:ow:Z:EF:P:N:R:U:T:V:J:Y?")) != EOF ) 
data/ipmiutil-3.1.7/util/icmd.c:183:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt( argc, argv,"djkm:qst:xp:N:P:R:U:EF:J:T:V:YZ:?")) != EOF ) 
data/ipmiutil-3.1.7/util/iconfig.c:1855:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ((c = getopt(argc, argv,"cdmlr:s:xL:T:V:J:EYF:P:N:R:U:Z:?")) != EOF)
data/ipmiutil-3.1.7/util/idcmi.c:757:22:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        while ( (c = getopt( argc, argv,"a:d:m:p:sT:V:J:EYF:P:N:R:U:Z:x?")) != EOF )
data/ipmiutil-3.1.7/util/idiscover.c:966:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt( argc, argv,"ab:ce:gi:l:mp:r:s:x?")) != EOF ) 
data/ipmiutil-3.1.7/util/iekanalyzer.c:4090:22:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        while ( (c = getopt( argc, argv,"m:p:T:V:J:EYF:P:N:R:U:Z:x?")) != EOF )
data/ipmiutil-3.1.7/util/ievents.c:2103:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			tz = getenv("TZ");
data/ipmiutil-3.1.7/util/ievents.c:2105:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
			lctime = getenv("LC_TIME");
data/ipmiutil-3.1.7/util/ifirewall.c:1100:22:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        while ( (c = getopt( argc, argv,"m:T:V:J:EYF:P:N:R:U:Z:x?")) != EOF )
data/ipmiutil-3.1.7/util/ifru.c:1656:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt( argc, argv,"a:bcd:efhkl:m:n:i:p:r:s:t:v:xyzT:V:J:EYF:P:N:R:U:Z:?")) != EOF )
data/ipmiutil-3.1.7/util/ifruset.c:1232:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt( argc, argv,"a:bcd:h:i:f:m:n:o:p:r:s:u:v:xyz:T:V:J:EYF:P:N:R:U:Z:?")) != EOF )
data/ipmiutil-3.1.7/util/ifwum.c:1656:22:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        while ( (c = getopt( argc, argv,"m:T:V:J:EYF:P:N:R:U:Z:x?")) != EOF )
data/ipmiutil-3.1.7/util/igetevent.c:1056:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt(argc,argv,"abce:lmn:op:r:st:uvT:V:J:YEF:P:N:R:U:Z:x?")) != EOF ) 
data/ipmiutil-3.1.7/util/igetevent.c:1183:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	  ipath = getenv("ipmiutildir");  /*ipmiutil directory path*/
data/ipmiutil-3.1.7/util/ihealth.c:909:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt( argc, argv,"cfghiln:o:p:q:sT:V:J:YEF:P:N:R:U:Z:x?")) != EOF ) 
data/ipmiutil-3.1.7/util/ihpm.c:3948:22:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        while ( (c = getopt( argc, argv,"m:z:T:V:J:EYF:P:N:R:U:Z:x?")) != EOF )
data/ipmiutil-3.1.7/util/ilan.c:4099:4:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	  getopt (argc, argv,
data/ipmiutil-3.1.7/util/ipicmg.c:1488:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
	  while ( (c = getopt( argc, argv,"m:i:T:V:J:EYF:P:N:R:U:Z:x?")) != EOF)
data/ipmiutil-3.1.7/util/ipmi_port.c:102:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ((c = getopt(argc, argv, "bx?")) != EOF) {
data/ipmiutil-3.1.7/util/ipmi_sample.c:118:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ((c = getopt( argc, argv,"i:l:m:p:f:s:t:xEF:N:P:R:T:U:V:YZ:?")) != EOF ) 
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:331:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt( argc, argv,"m:p:s:t:xEF:N:P:R:T:U:V:YZ:?")) != EOF ) 
data/ipmiutil-3.1.7/util/ipmicmd.c:1404:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                p = getenv("IPMI_PASSWORD");
data/ipmiutil-3.1.7/util/ipmilan.c:2020:9:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        srand((unsigned int)time(NULL));
data/ipmiutil-3.1.7/util/ireset.c:138:5:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
int getopt(int  argc, char **argv, const char *opts)
data/ipmiutil-3.1.7/util/ireset.c:532:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ((c = getopt(argc,argv,"bcdDefhi:j:km:noprsuvwyT:V:J:YEF:N:P:R:U:Z:x?")) != EOF)
data/ipmiutil-3.1.7/util/isel.c:660:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ((c = getopt(argc,argv,"a:b:cdef:h:i:l:m:np:rs:uwvxM:T:V:J:EYF:P:N:U:R:Z:?")) != EOF)
data/ipmiutil-3.1.7/util/isel.c:762:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      ipath = getenv("ipmiutildir");  /*ipmiutil directory path*/
data/ipmiutil-3.1.7/util/iseltime.c:215:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt( argc, argv,"sT:V:J:EYF:P:N:R:U:x?")) != EOF ) 
data/ipmiutil-3.1.7/util/isensor.c:3260:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt( argc, argv,"a:bcd:ef:g:h:i:j:k:l:m:n:opqrstu:vwxT:V:J:L:EYF:P:N:R:U:Z:?")) != EOF )
data/ipmiutil-3.1.7/util/iserial.c:846:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt( argc, argv,"abcdef:gi:lm:n:p:#:q:rstu:v:xB:F:T:V:J:EYP:N:R:U:X:Z:?")) != EOF ) 
data/ipmiutil-3.1.7/util/isol.c:1146:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt( argc, argv,"ac:dei:k:ln:o:p:rs:t:u:wv:xzEF:J:N:P:R:T:U:V:YZ:?")) != EOF ) 
data/ipmiutil-3.1.7/util/itsol.c:691:22:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        while ( (c = getopt( argc, argv,"m:T:V:J:EYF:P:N:R:U:Z:x?")) != EOF )
data/ipmiutil-3.1.7/util/iuser.c:253:18:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
    while ( (c = getopt( argc, argv,"cm:T:V:J:EYF:P:N:R:U:Z:x?")) != EOF )
data/ipmiutil-3.1.7/util/iwdt.c:295:16:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ((c = getopt(argc,argv,"cdelra:p:q:t:T:V:J:EYF:P:N:R:U:Z:x?")) != EOF )
data/ipmiutil-3.1.7/util/oem_asus.c:224:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt( argc, argv,"m:xzEF:J:N:P:R:T:U:V:YZ:?")) != EOF )
data/ipmiutil-3.1.7/util/oem_dell.c:6064:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt( argc, argv,"m:s:xzEF:J:N:P:R:T:U:V:YZ:?")) != EOF )
data/ipmiutil-3.1.7/util/oem_lenovo.c:419:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt( argc, argv,"m:xzEF:J:N:P:R:T:U:V:YZ:?")) != EOF )
data/ipmiutil-3.1.7/util/oem_sun.c:1012:22:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
        while ( (c = getopt( argc, argv,"m:T:V:J:EYF:P:N:R:U:Z:x?")) != EOF )
data/ipmiutil-3.1.7/util/oem_supermicro.c:903:17:  [3] (buffer) getopt:
  Some older implementations do not protect against internal buffer overflows
  (CWE-120, CWE-20). Check implementation on installation, or limit the size
  of all string inputs.
   while ( (c = getopt( argc, argv,"m:xzEF:J:N:P:R:T:U:V:YZ:?")) != EOF )
data/ipmiutil-3.1.7/hpiutil/hpialarmpanel.c:58:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *states[3] = {"off", "ON ", "unknown" };
data/ipmiutil-3.1.7/hpiutil/hpialarmpanel.c:102:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	case 'c': b = atoi(optarg);      /* set crit alarm value */
data/ipmiutil-3.1.7/hpiutil/hpialarmpanel.c:106:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	case 'm': b = atoi(optarg);      /* set major alarm value */
data/ipmiutil-3.1.7/hpiutil/hpialarmpanel.c:110:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	case 'n': b = atoi(optarg);      /* set minor alarm value */
data/ipmiutil-3.1.7/hpiutil/hpialarmpanel.c:114:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	case 'a': b = atoi(optarg);      /* set disk a fault led */
data/ipmiutil-3.1.7/hpiutil/hpialarmpanel.c:118:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	case 'b': b = atoi(optarg);      /* set disk b fault led */
data/ipmiutil-3.1.7/hpiutil/hpialarmpanel.c:122:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	case 'p': b = atoi(optarg);      /* set power alarm value */
data/ipmiutil-3.1.7/hpiutil/hpialarmpanel.c:126:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	case 'i': fid = atoi(optarg);     /* set chassis id on/off */
data/ipmiutil-3.1.7/hpiutil/hpialarmpanel.c:129:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	case 'd': raw_val = atoi(optarg);  /* set raw alarm byte  */
data/ipmiutil-3.1.7/hpiutil/hpievent.c:66:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char inbuff[1024];
data/ipmiutil-3.1.7/hpiutil/hpievent.c:67:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char outbuff[256];
data/ipmiutil-3.1.7/hpiutil/hpievent.c:78:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *rdrtypes[5] = {
data/ipmiutil-3.1.7/hpiutil/hpievent.c:87:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *units[NSU] = {
data/ipmiutil-3.1.7/hpiutil/hpifrua.c:54:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *chasstypes[NCT] = {
data/ipmiutil-3.1.7/hpiutil/hpifrua.c:69:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char inbuff[2048];
data/ipmiutil-3.1.7/hpiutil/hpifrua.c:70:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char outbuff[1024];
data/ipmiutil-3.1.7/hpiutil/hpifrub.c:45:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *chasstypes[NCT] = {
data/ipmiutil-3.1.7/hpiutil/hpifrub.c:61:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char inbuff[2048];
data/ipmiutil-3.1.7/hpiutil/hpifrub.c:62:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char outbuff[1024];
data/ipmiutil-3.1.7/hpiutil/hpifrub.c:349:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fieldstr[MAX_STRSIZE];
data/ipmiutil-3.1.7/hpiutil/hpisel.c:83:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *evtypes[NEVTYPES] = {"sensor","hotswap","watchdog","oem   ","user  "};
data/ipmiutil-3.1.7/hpiutil/hpisel.c:86:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *evtypes[NEVTYPES] = {"resource","domain","sensor","sens_enable",
data/ipmiutil-3.1.7/hpiutil/hpisel.c:125:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char def_estr[15] = "HPI error %d   ";
data/ipmiutil-3.1.7/hpiutil/hpisel.c:175:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *sensor_types[NSTYPES] = {  
data/ipmiutil-3.1.7/hpiutil/hpisel.c:280:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char desc[10];
data/ipmiutil-3.1.7/hpiutil/hpisel.c:294:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * crit_int_str[NCRITS] = {  /* Critical Interrupt descriptions */
data/ipmiutil-3.1.7/hpiutil/hpisel.c:307:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * slot_str[NSLOTC] = {  /* Slot/Connector descriptions */
data/ipmiutil-3.1.7/hpiutil/hpisel.c:327:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char desc[40];
data/ipmiutil-3.1.7/hpiutil/hpisel.c:423:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      pstr = (char *)sens_desc[i].desc; 
data/ipmiutil-3.1.7/hpiutil/hpisel.c:438:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mystr[26] = "(123)";  /*for panic string*/
data/ipmiutil-3.1.7/hpiutil/hpisel.c:439:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char poststr[24] = "OEM Post Code = %x%x";
data/ipmiutil-3.1.7/hpiutil/hpisel.c:440:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char genstr[10] = "03  ";
data/ipmiutil-3.1.7/hpiutil/hpisel.c:459:30:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			if (sensor_number & 0x80) strcat(mystr,"Oops!");
data/ipmiutil-3.1.7/hpiutil/hpisel.c:460:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			if (data2 & 0x80) strcat(mystr,"Int!");
data/ipmiutil-3.1.7/hpiutil/hpisel.c:461:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			if (data3 & 0x80) strcat(mystr,"NullPtr!");
data/ipmiutil-3.1.7/hpiutil/hpisel.c:485:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(poststr,"POST Code %02x%02x",
data/ipmiutil-3.1.7/hpiutil/hpisel.c:517:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(genstr,"%04x",gen_id);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:522:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			   gstr = (char *)gen_desc[i].desc;  
data/ipmiutil-3.1.7/hpiutil/hpisel.c:555:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char genstr[10] = "03  ";
data/ipmiutil-3.1.7/hpiutil/hpisel.c:561:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		   sprintf(outbuf," OEM Event %02x %02x ", pc[0], pc[1]);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:569:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(&outbuf[j],"%02x ",pc[i]);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:586:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		   sprintf(outbuf," Type%02x ", pc[0]);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:589:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(genstr,"%02x ",pc[i]);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:615:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char estag[8];
data/ipmiutil-3.1.7/hpiutil/hpisel.c:616:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sbuf[80];
data/ipmiutil-3.1.7/hpiutil/hpisel.c:631:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(estag,"%02x",es);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:640:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(estag,"%02x:%02x",ec,es);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:676:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(&def_estr[10],"%d",code);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:687:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timestr[40];
data/ipmiutil-3.1.7/hpiutil/hpisel.c:694:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char outbuf[132];
data/ipmiutil-3.1.7/hpiutil/hpisel.c:703:6:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
     strcpy(timestr,"invalid time     ");
data/ipmiutil-3.1.7/hpiutil/hpisel.c:706:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(timestr,"rel(%lx)", (unsigned long)tt1);  
data/ipmiutil-3.1.7/hpiutil/hpisel.c:745:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	pstr = (char *)sensor_types[styp];
data/ipmiutil-3.1.7/hpiutil/hpisensor.c:60:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *rtypes[5] = {"None    ", "Control ", "Sensor  ", "Invent  ", "Watchdog"};
data/ipmiutil-3.1.7/hpiutil/hpisensor.c:63:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *units[NSU] = {
data/ipmiutil-3.1.7/hpiutil/hpisensor.c:114:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char def_estr[15] = "HPI error %d   ";
data/ipmiutil-3.1.7/hpiutil/hpisensor.c:125:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(&def_estr[10],"%d",code);
data/ipmiutil-3.1.7/hpiutil/hpisensor.c:192:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy(reading.Interpreted.Value.SensorBuffer,
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:65:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *usedesc[NUSE] = {"reserved", "BIOS FRB2", "BIOS/POST",
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:68:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *actions[NACT] = {"No action", "Hard Reset", "Power down",
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ustr[12]; 
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char astr[16]; 
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:77:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char estr[30]; 
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:82:29:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if (wdt->TimerUse > NUSE) sprintf(ustr,"%d", wdt->TimerUse );
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:84:32:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if (wdt->TimerAction > NACT) sprintf(astr,"%d", wdt->TimerAction );
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:88:35:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  if (wdt->TimerUseExpFlags == 0) strcpy(estr,"none");
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:91:36:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (wdt->TimerUseExpFlags & 0x01) strcat(estr,"FRB2 ");
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:92:36:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (wdt->TimerUseExpFlags & 0x02) strcat(estr,"POST ");
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:93:36:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (wdt->TimerUseExpFlags & 0x04) strcat(estr,"OS_Load ");
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:94:36:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (wdt->TimerUseExpFlags & 0x08) strcat(estr,"SMS_OS ");
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:95:36:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	if (wdt->TimerUseExpFlags & 0x10) strcat(estr,"OEM ");
data/ipmiutil-3.1.7/hpiutil/hpiwdt.c:146:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		t = atoi(optarg);
data/ipmiutil-3.1.7/lib/lanplus/helper.c:90:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char str[1024];
data/ipmiutil-3.1.7/lib/lanplus/helper.c:99:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(str+i+i, "%2.2x", buf[i]);
data/ipmiutil-3.1.7/lib/lanplus/helper.c:131:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char un_str[32];
data/ipmiutil-3.1.7/lib/lanplus/helper.c:148:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char un_str[32];
data/ipmiutil-3.1.7/lib/lanplus/helper.c:332:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			fp = fopen(file, "w");
data/ipmiutil-3.1.7/lib/lanplus/helper.c:349:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fp = fopen(file, "r");
data/ipmiutil-3.1.7/lib/lanplus/helper.c:374:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(file, rw ? "w+" : "r");
data/ipmiutil-3.1.7/lib/lanplus/helper.c:457:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ((fd = open(_PATH_TTY, O_RDWR)) >= 0) {
data/ipmiutil-3.1.7/lib/lanplus/helper.c:477:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/dev/null", O_RDWR);
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_firewall.h:71:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char version[3];
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_firewall.h:72:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char subfn_support[MAX_SUBFN_BYTES];
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_firewall.h:73:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char subfn_config[MAX_SUBFN_BYTES];
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_firewall.h:74:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char subfn_enable[MAX_SUBFN_BYTES];
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_firewall.h:79:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char command_mask[MAX_COMMAND_BYTES];
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_firewall.h:80:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char config_mask[MAX_COMMAND_BYTES];
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_firewall.h:81:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char enable_mask[MAX_COMMAND_BYTES];
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_fru.h:215:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mfg_id[3];
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_fru.h:232:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char guid[16];
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_fru.h:271:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char linkInfo[3];
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_intf.h:175:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[16];
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_intf.h:176:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char desc[128];
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_intf.h:194:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int (*open)(struct ipmi_intf * intf);
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_lanp.h:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char desc[24];
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_sdr.h:125:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char popChangeInd[3];	/* free space in SDR */
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:110:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char lan2_nodename[80] = {0};     /*SZGNOE = 80*/
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:160:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(intf->name,"lanplus");
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:175:2:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	open:		ipmi_lanplus_open,
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:414:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&e->req, req, sizeof(struct ipmi_rq));
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:722:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data, &rmcp_ping, sizeof(rmcp_ping));
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:723:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data+sizeof(rmcp_ping), &asf_ping, sizeof(asf_ping));
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:775:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&rmcp_rsp, rsp->data, 4);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:1067:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	 memcpy(&(rsp->payload.open_session_response.console_id),
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:1081:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	 memcpy(&(rsp->payload.open_session_response.bmc_id),
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:1139:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	 memcpy(&(rsp->payload.rakp2_message.console_id),
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:1148:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	 memcpy(&(rsp->payload.rakp2_message.bmc_rand),
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:1156:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	 memcpy(&(rsp->payload.rakp2_message.bmc_guid),
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:1233:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	 memcpy(&(rsp->payload.rakp4_message.console_id),
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:1349:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rsp->session.id, rsp->data + *offset, 4);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:1372:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rsp->session.seq, rsp->data + *offset, 4);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:1378:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rsp->session.msglen, rsp->data + *offset, 2);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:1629:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(msg + len, req->msg.data, req->msg.data_len);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:1704:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg + i,
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:1812:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg, &rmcp, sizeof(rmcp));
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:1890:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(msg + IPMI_LANPLUS_OFFSET_PAYLOAD,
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:1898:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(msg + IPMI_LANPLUS_OFFSET_PAYLOAD,
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:1906:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(msg + IPMI_LANPLUS_OFFSET_PAYLOAD,
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:2215:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg, &rmcp, sizeof(rmcp));
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:2277:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(msg+len, req->msg.data, req->msg.data_len);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:2342:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!intf->opened && intf->open && intf->open(intf) < 0)
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:2342:43:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (!intf->opened && intf->open && intf->open(intf) < 0)
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:2365:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char msg[256];
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:2367:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
					sprintf(msg, ">>    data    : ");
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:2370:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
						sprintf(&msg[n], "0x%02x ", ipmi_request->msg.data[i]);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:3000:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(auth_cap,
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:3033:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&msg_data, &bmc_session_lsbf, 4);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:3311:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg + 8, session->v2_data.console_rand, 16);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:3342:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(msg + 28, session->username, msg[27]);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:3374:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(session->v2_data.bmc_rand, rsp->payload.rakp2_message.bmc_rand, 16);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:3375:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(session->v2_data.bmc_guid, rsp->payload.rakp2_message.bmc_guid, 16);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:3659:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char service[NI_MAXSERV];
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:3722:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(service, "%d", session->port);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:3752:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	                memcpy(&addr, rp->ai_addr, addrlen);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:3787:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&addr.sin_addr, host->h_addr, host->h_length);
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt.c:119:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, &SIDm_lsbf, 4);
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt.c:126:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer + 4, &SIDc_lsbf, 4);
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt.c:296:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer + 16, &SIDc_lsbf, 4);
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt.c:468:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(input_buffer + 16, &SIDm_lsbf, 4);
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt.c:688:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(session->v2_data.k1, CONST_1, 20);
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt.c:749:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(session->v2_data.k2, CONST_2, 20);
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt.c:848:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(padded_input, input, input_length);
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt_impl.c:80:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[200];
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt_impl.c:86:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		   fp = fopen(randfile,"r");  /*check the randfile*/
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt_impl.c:89:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
              fp = fopen(randfile,"w");  /*create the randfile*/
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt_impl.c:357:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buffer[1000];
data/ipmiutil-3.1.7/lib/lanplus/lanplus_defs.h:344:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[16];
data/ipmiutil-3.1.7/lib/lanplus/lanplus_defs.h:345:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char desc[128];
data/ipmiutil-3.1.7/lib/lanplus/lanplus_defs.h:363:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	int (*open)(struct ipmi_intf * intf);
data/ipmiutil-3.1.7/util/AnsiTerm.cpp:246:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(consoleInfo.ColorTable, m_OrigColorTable, kColorTableSize * sizeof(consoleInfo.ColorTable[0]));
data/ipmiutil-3.1.7/util/AnsiTerm.cpp:315:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(m_OrigColorTable, consoleInfo.ColorTable, colorCopyLen);
data/ipmiutil-3.1.7/util/AnsiTerm.cpp:317:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(consoleInfo.ColorTable, s_ColorTable, colorCopyLen);
data/ipmiutil-3.1.7/util/AnsiTerm.cpp:797:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    szParam[15];
data/ipmiutil-3.1.7/util/AnsiTerm.cpp:809:29:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        int     iLenParam = sprintf(szParam, "%d", m_Parameters[idxParam]);
data/ipmiutil-3.1.7/util/AnsiTerm.h:178:12:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static wchar_t      s_GraphicChars[kMaxGraphicsChar - kMinGraphicsChar + 1];
data/ipmiutil-3.1.7/util/AnsiTerm.h:179:12:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static wchar_t      s_OemToUnicode[256];
data/ipmiutil-3.1.7/util/AnsiTerm.h:286:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t         m_OutputBuffer[kOutputBufferSize];
data/ipmiutil-3.1.7/util/AnsiTerm.h:289:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char   m_UTF8Buffer[3];
data/ipmiutil-3.1.7/util/ialarms.c:244:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(rgv,responseData,responseLength);
data/ipmiutil-3.1.7/util/ialarms.c:292:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char led_str[10]; 
data/ipmiutil-3.1.7/util/ialarms.c:293:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char state_str[20]; 
data/ipmiutil-3.1.7/util/ialarms.c:301:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	case 0: strcpy(led_str,"HSLed"); break;  /*Blue LED*/
data/ipmiutil-3.1.7/util/ialarms.c:302:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	default: sprintf(led_str," Led%d",led); break;
data/ipmiutil-3.1.7/util/ialarms.c:305:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (v[1] & 0x01) strcat(state_str,"local");
data/ipmiutil-3.1.7/util/ialarms.c:306:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (v[1] & 0x02) strcat(state_str," override");
data/ipmiutil-3.1.7/util/ialarms.c:307:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    if (v[1] & 0x04) strcat(state_str," lamptest");
data/ipmiutil-3.1.7/util/ialarms.c:396:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 'i': fid = atoi(optarg);   /* set chassis id on/off */
data/ipmiutil-3.1.7/util/icmd.c:206:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    i = atoi(optarg);
data/ipmiutil-3.1.7/util/iconfig.c:234:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char   ifname[16]    = "eth0"; /* interface name */
data/ipmiutil-3.1.7/util/iconfig.c:235:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char   ifname0[16]   = "eth0"; /* first interface name */
data/ipmiutil-3.1.7/util/iconfig.c:236:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char   ifpattn[14]   = "eth";  /* default, discovered via find_ifname */
data/ipmiutil-3.1.7/util/iconfig.c:249:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *pefdesc1[MAXPEF] = {    /* for Sahalee BMC */
data/ipmiutil-3.1.7/util/iconfig.c:282:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *pefdesc2[MAXPEF] = {    /* for NSC miniBMC */
data/ipmiutil-3.1.7/util/iconfig.c:319:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char desc[28];
data/ipmiutil-3.1.7/util/iconfig.c:366:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char desc[28];
data/ipmiutil-3.1.7/util/iconfig.c:420:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pLanRecord,&responseData[0],responseLength);
data/ipmiutil-3.1.7/util/iconfig.c:452:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pLanRecord,&responseData[0],responseLength);
data/ipmiutil-3.1.7/util/iconfig.c:498:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char  inputData[24];
data/ipmiutil-3.1.7/util/iconfig.c:575:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pLanRecord,&responseData[1],responseLength-1);
data/ipmiutil-3.1.7/util/iconfig.c:605:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&inputData[2],pSerRecord,reqlen);
data/ipmiutil-3.1.7/util/iconfig.c:661:28:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                           memcpy(pLanRecord,&responseData[1],n);
data/ipmiutil-3.1.7/util/iconfig.c:698:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&inputData[2],pLanRecord,reqlen);
data/ipmiutil-3.1.7/util/iconfig.c:757:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			else memcpy(pPefRecord,&responseData[1],n);
data/ipmiutil-3.1.7/util/iconfig.c:791:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&inputData[1],pPefRecord,sizeof(PEF_RECORD));
data/ipmiutil-3.1.7/util/iconfig.c:930:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(rgmymac, AdapterList->PhysicalAddress, MAC_LEN);
data/ipmiutil-3.1.7/util/iconfig.c:971:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(rgmyip, &si->sin_addr.s_addr, 4);
data/ipmiutil-3.1.7/util/iconfig.c:972:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(osmyip, &si->sin_addr.s_addr, 4);
data/ipmiutil-3.1.7/util/iconfig.c:973:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(osmymac, AdapterList->PhysicalAddress, MAC_LEN);
data/ipmiutil-3.1.7/util/iconfig.c:1017:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rgmyip, &si->sin_addr.s_addr, 4);
data/ipmiutil-3.1.7/util/iconfig.c:1018:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rgmymac, AdapterList->PhysicalAddress, MAC_LEN);
data/ipmiutil-3.1.7/util/iconfig.c:1036:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(macadr,macadrin,MAC_LEN);
data/ipmiutil-3.1.7/util/iconfig.c:1083:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szDeviceName[ 16 ];  /* sizeof(ifpattn), MAX_DEVICE_NAME_LENGTH + 1 */
data/ipmiutil-3.1.7/util/iconfig.c:1087:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(macadr,macadrin,MAC_LEN);
data/ipmiutil-3.1.7/util/iconfig.c:1278:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&DestIp, ipadr, 4);
data/ipmiutil-3.1.7/util/iconfig.c:1287:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(macadr, bPhysAddr, MAC_LEN);
data/ipmiutil-3.1.7/util/iconfig.c:1292:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(macadr, rggwymac, MAC_LEN);
data/ipmiutil-3.1.7/util/iconfig.c:1326:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buff[1024]; 
data/ipmiutil-3.1.7/util/iconfig.c:1329:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char arping_cmd[128];
data/ipmiutil-3.1.7/util/iconfig.c:1349:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fparp = fopen(alertfile,"r");
data/ipmiutil-3.1.7/util/iconfig.c:1388:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(rgdestmac,rggwymac,6);  /* get to it from the default gateway */
data/ipmiutil-3.1.7/util/iconfig.c:1424:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(rgsubnet, &(pIPAddrTable->table[i].dwMask), 4);
data/ipmiutil-3.1.7/util/iconfig.c:1496:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(rggwyip, &gwaddr, 4);
data/ipmiutil-3.1.7/util/iconfig.c:1831:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char filename[80] = "";
data/ipmiutil-3.1.7/util/iconfig.c:1840:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char line[240]; /* hdr(18) + data(192 = 64 * 3) + '\0' = 211 */
data/ipmiutil-3.1.7/util/iconfig.c:1841:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char key[40];
data/ipmiutil-3.1.7/util/iconfig.c:1842:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char value[100];
data/ipmiutil-3.1.7/util/iconfig.c:1915:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	case 'r':  fd_bmc = fopen(filename,"r"); break;
data/ipmiutil-3.1.7/util/iconfig.c:1916:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	case 's':  fd_bmc = fopen(filename,"w"); break;
data/ipmiutil-3.1.7/util/iconfig.c:2064:30:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
       if (lan_ch == gcm_ch) strcpy(ifname,"gcm");
data/ipmiutil-3.1.7/util/iconfig.c:2167:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	     strcpy(lanparams[idx].desc,"IPMI Hostname");
data/ipmiutil-3.1.7/util/iconfig.c:2208:36:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                if (IpIsValid(pc)) memcpy(bmcmyip,pc,4);
data/ipmiutil-3.1.7/util/iconfig.c:2210:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		if (MacIsValid(pc)) memcpy(bmcmymac,pc,MAC_LEN);
data/ipmiutil-3.1.7/util/iconfig.c:2214:40:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                if (IpIsValid(&pc[3])) memcpy(bmcdestip,&pc[3],4);
data/ipmiutil-3.1.7/util/iconfig.c:2319:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		   memcpy(pc,&rData,sz);   /*should be 3 bytes*/
data/ipmiutil-3.1.7/util/iconfig.c:2526:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&pc[1],&LanRecord[0],16);
data/ipmiutil-3.1.7/util/iconfig.c:2602:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(&pc[2],&LanRecord,j); 
data/ipmiutil-3.1.7/util/iconfig.c:2619:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	       memcpy(&pc[2],&LanRecord,j); 
data/ipmiutil-3.1.7/util/idcmi.c:85:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char mc_id[64];
data/ipmiutil-3.1.7/util/idcmi.c:86:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char asset[64];
data/ipmiutil-3.1.7/util/idcmi.c:167:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pdata,rdata,rlen);
data/ipmiutil-3.1.7/util/idcmi.c:201:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(pdata,rdata,rlen);
data/ipmiutil-3.1.7/util/idcmi.c:235:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(pdata,rdata,rlen);
data/ipmiutil-3.1.7/util/idcmi.c:249:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(idata,pow,spow);
data/ipmiutil-3.1.7/util/idcmi.c:329:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&t,&cdata[9],4);
data/ipmiutil-3.1.7/util/idcmi.c:413:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy(pdata,rdata,rlen);
data/ipmiutil-3.1.7/util/idcmi.c:509:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy(&pdata[n],&rdata[2],sz_chunk);
data/ipmiutil-3.1.7/util/idcmi.c:551:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy(&pdata[n],&rdata[2],sz_chunk);
data/ipmiutil-3.1.7/util/idcmi.c:576:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   memcpy(&idata[3],&pdata[n],sz_chunk);
data/ipmiutil-3.1.7/util/idcmi.c:610:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   memcpy(&idata[3],&pdata[n],sz_chunk);
data/ipmiutil-3.1.7/util/idcmi.c:641:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *supported[2] = { "Unsupported", "Supported" };
data/ipmiutil-3.1.7/util/idcmi.c:645:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mystr[64] = "";
data/ipmiutil-3.1.7/util/idcmi.c:667:28:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	     if (cdata[5] & 0x80) strcat(mystr,"Overwrite ");
data/ipmiutil-3.1.7/util/idcmi.c:668:12:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	     else strcat(mystr,"NoOverwrite ");
data/ipmiutil-3.1.7/util/idcmi.c:669:28:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	     if (cdata[5] & 0x40) strcat(mystr,"FlushAll ");
data/ipmiutil-3.1.7/util/idcmi.c:670:28:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	     if (cdata[5] & 0x20) strcat(mystr,"FlushRec");
data/ipmiutil-3.1.7/util/idcmi.c:696:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		case 3: strcpy(mystr,"days");  break;
data/ipmiutil-3.1.7/util/idcmi.c:697:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		case 2: strcpy(mystr,"hrs");  break;
data/ipmiutil-3.1.7/util/idcmi.c:698:11:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		case 1: strcpy(mystr,"min");  break;
data/ipmiutil-3.1.7/util/idcmi.c:700:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		default: strcpy(mystr,"sec");  break;
data/ipmiutil-3.1.7/util/idcmi.c:812:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   memcpy(asset,asset_new,asset_len);
data/ipmiutil-3.1.7/util/idcmi.c:822:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   memcpy(mc_id,mcid_new,mcid_len);
data/ipmiutil-3.1.7/util/idcmi.c:863:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		 i = atoi(argv[2]);
data/ipmiutil-3.1.7/util/idcmi.c:915:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		 i = atoi(argv[2]);
data/ipmiutil-3.1.7/util/idcmi.c:929:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		 i = atoi(argv[2]);
data/ipmiutil-3.1.7/util/idiscover.c:179:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char g_startDest[MAXHOSTNAMELEN+1] = {'\0'};  
data/ipmiutil-3.1.7/util/idiscover.c:180:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char g_endDest[MAXHOSTNAMELEN+1] = {'\0'};
data/ipmiutil-3.1.7/util/idiscover.c:181:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char g_interface[INET_ADDRSTRLEN+1] = {""};  /*e.g. "eth0"*/
data/ipmiutil-3.1.7/util/idiscover.c:244:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char strbuf[80];
data/ipmiutil-3.1.7/util/idiscover.c:454:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     char ipstr[20];
data/ipmiutil-3.1.7/util/idiscover.c:460:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		 sprintf(ipstr,"%d.%d.%d.255",osip[0],osip[1],osip[2]);
data/ipmiutil-3.1.7/util/idiscover.c:465:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		 strcpy(g_startDest,"255.255.255.255");
data/ipmiutil-3.1.7/util/idiscover.c:466:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		 strcpy(g_endDest,"255.255.255.255");
data/ipmiutil-3.1.7/util/idiscover.c:472:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char devname[INET_ADDRSTRLEN+1];
data/ipmiutil-3.1.7/util/idiscover.c:475:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(devname,"lan%d",n);
data/ipmiutil-3.1.7/util/idiscover.c:482:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char devname[INET_ADDRSTRLEN+1];
data/ipmiutil-3.1.7/util/idiscover.c:499:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(devname,"e1000g%d",i);
data/ipmiutil-3.1.7/util/idiscover.c:501:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(devname,"em%d",i);
data/ipmiutil-3.1.7/util/idiscover.c:503:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(devname,"eth%d",i);
data/ipmiutil-3.1.7/util/idiscover.c:624:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char host[200];
data/ipmiutil-3.1.7/util/idiscover.c:630:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char serv[200];
data/ipmiutil-3.1.7/util/idiscover.c:667:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char rstr[40];
data/ipmiutil-3.1.7/util/idiscover.c:668:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char macstr[20];
data/ipmiutil-3.1.7/util/idiscover.c:670:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      char estr[40];
data/ipmiutil-3.1.7/util/idiscover.c:713:19:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                  sprintf(macstr,"%02x:%02x:%02x:%02x:%02x:%02x %c",
data/ipmiutil-3.1.7/util/idiscover.c:716:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy(&from_ip,&buffer[26],4);  /*26=src_ip*/
data/ipmiutil-3.1.7/util/idiscover.c:718:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		  memcpy(&from_ip,&from.sin_addr,4);
data/ipmiutil-3.1.7/util/idiscover.c:744:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf(rstr,"%c (ccode=0x%02x)",bdelim,buffer[20]);
data/ipmiutil-3.1.7/util/idiscover.c:746:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		    sprintf(rstr,"%c (channel %d)",bdelim,buffer[21]);
data/ipmiutil-3.1.7/util/idiscover.c:752:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		 sprintf(estr,"response from %c ",bdelim);
data/ipmiutil-3.1.7/util/idiscover.c:873:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char _dest_ip[INET_ADDRSTRLEN+1];
data/ipmiutil-3.1.7/util/idiscover.c:888:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(_dest_ip,"%d.%d.%d.%d",o[0],o[1],o[2],o[3]);
data/ipmiutil-3.1.7/util/idiscover.c:956:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char message[32];
data/ipmiutil-3.1.7/util/idiscover.c:977:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 'l': g_limit = atoi(optarg); break;
data/ipmiutil-3.1.7/util/idiscover.c:989:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                g_port = (ushort)atoi(optarg);
data/ipmiutil-3.1.7/util/idiscover.c:992:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                g_repeat = atoi(optarg);
data/ipmiutil-3.1.7/util/idiscover.c:1014:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(g_startDest,"255.255.255.255"); /* INADDR_BROADCAST */
data/ipmiutil-3.1.7/util/iekanalyzer.c:302:43:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static int ipmi_ek_compare_asym( unsigned char asym[COMPARE_CANDIDATE] );
data/ipmiutil-3.1.7/util/iekanalyzer.c:510:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char * filename[MAX_FILE_NUMBER];
data/ipmiutil-3.1.7/util/iekanalyzer.c:889:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy ( &port_desc, &record->data[offset],
data/ipmiutil-3.1.7/util/iekanalyzer.c:1006:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy ( &car, &list_record[num_file]->data[index_data],
data/ipmiutil-3.1.7/util/iekanalyzer.c:1013:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                  memcpy( &cur_desc[index],
data/ipmiutil-3.1.7/util/iekanalyzer.c:1965:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            unsigned char asym[COMPARE_CANDIDATE];
data/ipmiutil-3.1.7/util/iekanalyzer.c:2015:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
ipmi_ek_compare_asym( unsigned char asym[COMPARE_CANDIDATE] )
data/ipmiutil-3.1.7/util/iekanalyzer.c:2257:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy ( &amc_record->oem_guid[index_oem].guid,
data/ipmiutil-3.1.7/util/iekanalyzer.c:2286:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&amc_record->ch_desc[ch_index], &record->data[index_data],
data/ipmiutil-3.1.7/util/iekanalyzer.c:2297:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy (&amc_record->link_desc[i], &record->data[index_data],
data/ipmiutil-3.1.7/util/iekanalyzer.c:2337:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy ( &port_desc[num_port], &record->data[index],
data/ipmiutil-3.1.7/util/iekanalyzer.c:2372:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   input_file = fopen ( filename, "r");
data/ipmiutil-3.1.7/util/iekanalyzer.c:2429:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   input_file = fopen ( filename, "r");
data/ipmiutil-3.1.7/util/iekanalyzer.c:2517:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               unsigned char mfg_date[SIZE_MFG_DATE];
data/ipmiutil-3.1.7/util/iekanalyzer.c:3934:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   input_file = fopen ( filename, "r");
data/ipmiutil-3.1.7/util/iekanalyzer.h:251:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char mfg_id[3];
data/ipmiutil-3.1.7/util/iekanalyzer.h:282:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char guid[16];
data/ipmiutil-3.1.7/util/iekanalyzer.h:327:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char linkInfo[3];
data/ipmiutil-3.1.7/util/ievents.c:124:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char sensfil[80] = "sensor_out.txt";
data/ipmiutil-3.1.7/util/ievents.c:125:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char sensfil2[80] = "%ipmiutildir%\\sensor_out.txt";
data/ipmiutil-3.1.7/util/ievents.c:128:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char sensfil[80] = "/var/lib/ipmiutil/sensor_out.txt";
data/ipmiutil-3.1.7/util/ievents.c:129:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char sensfil2[80] = "/usr/share/ipmiutil/sensor_out.txt";
data/ipmiutil-3.1.7/util/ievents.c:132:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char rawfil[80] = "";
data/ipmiutil-3.1.7/util/ievents.c:144:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *sev_str[NSEV] = {
data/ipmiutil-3.1.7/util/ievents.c:152:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *sensor_types[NSTYPES] = {  
data/ipmiutil-3.1.7/util/ievents.c:259:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 const char desc[8];
data/ipmiutil-3.1.7/util/ievents.c:276:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * crit_int_str[NCRITS] = {  /* Critical Interrupt descriptions */
data/ipmiutil-3.1.7/util/ievents.c:289:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * boot_init_str[NBOOTI] = {  /* System Boot Initiated */
data/ipmiutil-3.1.7/util/ievents.c:300:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * osboot_str[NOSBOOT] = {  /* OS Boot */
data/ipmiutil-3.1.7/util/ievents.c:312:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * slot_str[NSLOTC] = {  /* Slot/Connector descriptions */
data/ipmiutil-3.1.7/util/ievents.c:324:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * batt_str[NBATT] = {  /* Battery assert descriptions */
data/ipmiutil-3.1.7/util/ievents.c:328:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * batt_clr[NBATT] = {  /* Battery deassert descriptions */
data/ipmiutil-3.1.7/util/ievents.c:334:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * nmh_str[N_NMH] = {  /* ME Node Manager Health (73) descriptions */
data/ipmiutil-3.1.7/util/ievents.c:343:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * nmfw_str[N_NMFW] = {  /* ME Firmware Health (75) descriptions */
data/ipmiutil-3.1.7/util/ievents.c:352:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * nm_str[N_NM] = {  /* Node Manager descriptions */
data/ipmiutil-3.1.7/util/ievents.c:359:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * proc_str[NPROC] = {  /* Processor descriptions */
data/ipmiutil-3.1.7/util/ievents.c:373:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * acpip_str[NACPIP] = {  /* ACPI Power State descriptions */
data/ipmiutil-3.1.7/util/ievents.c:391:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * audit_str[NAUDIT] = {  /* Session Audit descriptions */
data/ipmiutil-3.1.7/util/ievents.c:396:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * avail_str[N_AVAIL] = {  /* Discrete Availability, evtype 0x0A */
data/ipmiutil-3.1.7/util/ievents.c:418:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 const char desc[40];
data/ipmiutil-3.1.7/util/ievents.c:727:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char mystr[30];
data/ipmiutil-3.1.7/util/ievents.c:735:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   default: sprintf(mystr,"error = %d",rv); pstr = mystr; break;
data/ipmiutil-3.1.7/util/ievents.c:860:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char stype_desc[25];
data/ipmiutil-3.1.7/util/ievents.c:871:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	     sprintf(stype_desc,"OEM(%02x)",stype);
data/ipmiutil-3.1.7/util/ievents.c:875:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	pstr = (char *)sensor_types[i];
data/ipmiutil-3.1.7/util/ievents.c:916:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      pstr = (char *)sens_desc[i].desc; 
data/ipmiutil-3.1.7/util/ievents.c:1016:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[1024];
data/ipmiutil-3.1.7/util/ievents.c:1025:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(fname,"r");
data/ipmiutil-3.1.7/util/ievents.c:1106:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char pattn[20];
data/ipmiutil-3.1.7/util/ievents.c:1107:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sensline[100];
data/ipmiutil-3.1.7/util/ievents.c:1116:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(pattn,"snum %02x",snum);
data/ipmiutil-3.1.7/util/ievents.c:1165:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char genstr[10];
data/ipmiutil-3.1.7/util/ievents.c:1169:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(genstr,"%04x",genid);
data/ipmiutil-3.1.7/util/ievents.c:1174:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
         gstr = (char *)gen_desc[i].desc;  
data/ipmiutil-3.1.7/util/ievents.c:1271:17:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   if (rv != 0) strcpy(tag,"na ");
data/ipmiutil-3.1.7/util/ievents.c:1419:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char * present_str[N_PRESENT] = {  /* Availability, evtype 0x08 */
data/ipmiutil-3.1.7/util/ievents.c:1447:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sensdesc[36];
data/ipmiutil-3.1.7/util/ievents.c:1448:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char timestr[40]; 
data/ipmiutil-3.1.7/util/ievents.c:1512:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mystr[80] = "panic(123)";  /*used for panic string*/
data/ipmiutil-3.1.7/util/ievents.c:1514:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char poststr[80] = "OEM Post Code = %x%x";
data/ipmiutil-3.1.7/util/ievents.c:1515:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sensstr[50];
data/ipmiutil-3.1.7/util/ievents.c:1516:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char datastr[64];
data/ipmiutil-3.1.7/util/ievents.c:1517:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cstr[4];
data/ipmiutil-3.1.7/util/ievents.c:1522:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char timebuf[40];
data/ipmiutil-3.1.7/util/ievents.c:1533:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mdesc[80];   /*used for oem memory description*/
data/ipmiutil-3.1.7/util/ievents.c:1568:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			   else sprintf(&outbuf[j],"%c",pc[i]);
data/ipmiutil-3.1.7/util/ievents.c:1593:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(&outbuf[j],"%02x ",pc[i]);
data/ipmiutil-3.1.7/util/ievents.c:1620:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			   sprintf(&outbuf[j],"%02x ",pc[i]);
data/ipmiutil-3.1.7/util/ievents.c:1624:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			   else sprintf(&outbuf[j],"%c",pc[i]);
data/ipmiutil-3.1.7/util/ievents.c:1656:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(&outbuf[j],"%02x ",pc[i]);
data/ipmiutil-3.1.7/util/ievents.c:1680:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(&outbuf[j],"%02x ",pc[i]);
data/ipmiutil-3.1.7/util/ievents.c:1708:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			      strcpy(mystr,"panic(");
data/ipmiutil-3.1.7/util/ievents.c:1722:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				   strcat(mystr,"Oops!");
data/ipmiutil-3.1.7/util/ievents.c:1724:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				   strcat(mystr,"Int!");
data/ipmiutil-3.1.7/util/ievents.c:1726:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
				   strcat(mystr,"NullPtr!");
data/ipmiutil-3.1.7/util/ievents.c:1744:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(mystr,"Temp OK");
data/ipmiutil-3.1.7/util/ievents.c:1745:12:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			   else strcpy(mystr,"Temp Asserted");
data/ipmiutil-3.1.7/util/ievents.c:1968:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			   sprintf(mystr,"Sensor %02x fault",psel->event_data2);
data/ipmiutil-3.1.7/util/ievents.c:1970:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			   sprintf(mystr,"Other FW HAL error");
data/ipmiutil-3.1.7/util/ievents.c:2012:19:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			if (fdeassert) strcat(mystr," OK");
data/ipmiutil-3.1.7/util/ievents.c:2014:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(cstr,"%c ",bcomma);
data/ipmiutil-3.1.7/util/ievents.c:2065:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			   strcpy(mystr,"Performance Lags");
data/ipmiutil-3.1.7/util/ievents.c:2070:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			   strcpy(mystr,"Performance OK");
data/ipmiutil-3.1.7/util/ievents.c:2097:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tbuf[40];
data/ipmiutil-3.1.7/util/ievents.c:2137:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		          sprintf(datastr,"act=%02x thr=%02x",
data/ipmiutil-3.1.7/util/ievents.c:2143:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		      else sprintf(datastr,"%02x [%02x %02x %02x]",
data/ipmiutil-3.1.7/util/ievents.c:2166:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(mystr,"%02x ",pc[i]);
data/ipmiutil-3.1.7/util/ievents.c:2208:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buff[256];
data/ipmiutil-3.1.7/util/ievents.c:2209:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msg[132];
data/ipmiutil-3.1.7/util/ievents.c:2214:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(raw_file,"r");
data/ipmiutil-3.1.7/util/ievents.c:2345:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             iopt = atoi(argv[1]);
data/ipmiutil-3.1.7/util/ievents.c:2400:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	     fp = fopen(sensfil,"r");
data/ipmiutil-3.1.7/util/ievents.c:2476:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char sensdesc[100];
data/ipmiutil-3.1.7/util/ievents.c:2553:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&buf[13],&pmsg[15],3);  /*event data*/
data/ipmiutil-3.1.7/util/ifirewall.c:225:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(netfn, d, 16);
data/ipmiutil-3.1.7/util/ifirewall.c:246:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char * d, rqdata[3];
data/ipmiutil-3.1.7/util/ifirewall.c:274:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lnfn->command_mask, d, MAX_COMMAND_BYTES/2);
data/ipmiutil-3.1.7/util/ifirewall.c:296:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lnfn->command_mask+MAX_COMMAND_BYTES/2, d, MAX_COMMAND_BYTES/2);
data/ipmiutil-3.1.7/util/ifirewall.c:316:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char * d, rqdata[3];
data/ipmiutil-3.1.7/util/ifirewall.c:344:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lnfn->config_mask, d, MAX_COMMAND_BYTES/2);
data/ipmiutil-3.1.7/util/ifirewall.c:366:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lnfn->config_mask+MAX_COMMAND_BYTES/2, d, MAX_COMMAND_BYTES/2);
data/ipmiutil-3.1.7/util/ifirewall.c:386:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char * d, rqdata[3];
data/ipmiutil-3.1.7/util/ifirewall.c:414:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lnfn->enable_mask, d, MAX_COMMAND_BYTES/2);
data/ipmiutil-3.1.7/util/ifirewall.c:436:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lnfn->enable_mask+MAX_COMMAND_BYTES/2, d, MAX_COMMAND_BYTES/2);
data/ipmiutil-3.1.7/util/ifirewall.c:460:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char * d, rqdata[19];
data/ipmiutil-3.1.7/util/ifirewall.c:501:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rqdata[3], enable, MAX_COMMAND_BYTES/2);
data/ipmiutil-3.1.7/util/ifirewall.c:518:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rqdata[3], enable+MAX_COMMAND_BYTES/2, MAX_COMMAND_BYTES/2);
data/ipmiutil-3.1.7/util/ifirewall.c:548:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char rqdata[4];
data/ipmiutil-3.1.7/util/ifirewall.c:591:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char rqdata[4];
data/ipmiutil-3.1.7/util/ifirewall.c:634:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char rqdata[4];
data/ipmiutil-3.1.7/util/ifirewall.c:679:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char rqdata[8];
data/ipmiutil-3.1.7/util/ifirewall.c:711:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&rqdata[4], enable, MAX_SUBFN_BYTES);
data/ipmiutil-3.1.7/util/ifirewall.c:737:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char lun[MAX_LUN], netfn[16];
data/ipmiutil-3.1.7/util/ifirewall.c:950:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char enables[MAX_COMMAND_BYTES];
data/ipmiutil-3.1.7/util/ifirewall.c:989:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(enables,
data/ipmiutil-3.1.7/util/ifirewall.c:1039:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char enables[MAX_COMMAND_BYTES];
data/ipmiutil-3.1.7/util/ifirewall.h:71:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char version[3];
data/ipmiutil-3.1.7/util/ifirewall.h:72:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char subfn_support[MAX_SUBFN_BYTES];
data/ipmiutil-3.1.7/util/ifirewall.h:73:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char subfn_config[MAX_SUBFN_BYTES];
data/ipmiutil-3.1.7/util/ifirewall.h:74:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char subfn_enable[MAX_SUBFN_BYTES];
data/ipmiutil-3.1.7/util/ifirewall.h:79:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char command_mask[MAX_COMMAND_BYTES];
data/ipmiutil-3.1.7/util/ifirewall.h:80:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char config_mask[MAX_COMMAND_BYTES];
data/ipmiutil-3.1.7/util/ifirewall.h:81:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char enable_mask[MAX_COMMAND_BYTES];
data/ipmiutil-3.1.7/util/ifru.c:161:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char   asset_tag[FIELD_LEN]  = {0};
data/ipmiutil-3.1.7/util/ifru.c:162:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char   serial_num[FIELD_LEN] = {0};
data/ipmiutil-3.1.7/util/ifru.c:163:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char   prod_ver[FIELD_LEN] = {0};
data/ipmiutil-3.1.7/util/ifru.c:164:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char   chassis_name[FIELD_LEN] = {0};
data/ipmiutil-3.1.7/util/ifru.c:165:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char   ps_prod[FIELD_LEN] = {0};
data/ipmiutil-3.1.7/util/ifru.c:213:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *ctypes[MAX_CTYPE] = { "", "Other", "Unknown", "Desktop", 
data/ipmiutil-3.1.7/util/ifru.c:224:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *chassis[NUM_CHASSIS_FIELDS] = {
data/ipmiutil-3.1.7/util/ifru.c:228:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *board[NUM_BOARD_FIELDS] = {
data/ipmiutil-3.1.7/util/ifru.c:235:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *product[NUM_PRODUCT_FIELDS] = {
data/ipmiutil-3.1.7/util/ifru.c:327:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&frubuf[i],&resp[1],chunk);
data/ipmiutil-3.1.7/util/ifru.c:347:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(&guid,&resp,16);
data/ipmiutil-3.1.7/util/ifru.c:367:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  union { uint32_t bits; char chars[4]; } u;
data/ipmiutil-3.1.7/util/ifru.c:397:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((void *)&u.bits, &s[i], k);
data/ipmiutil-3.1.7/util/ifru.c:409:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(target, source, len);
data/ipmiutil-3.1.7/util/ifru.c:519:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char devstr[24];
data/ipmiutil-3.1.7/util/ifru.c:680:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mystr[256];
data/ipmiutil-3.1.7/util/ifru.c:774:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mystr,&pdata[1],dlen-1);
data/ipmiutil-3.1.7/util/ifru.c:810:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char newstr[64];
data/ipmiutil-3.1.7/util/ifru.c:814:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char devstr[24];
data/ipmiutil-3.1.7/util/ifru.c:1098:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req[3],&data[i],chunk);
data/ipmiutil-3.1.7/util/ifru.c:1215:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pnew,pfru,j);
data/ipmiutil-3.1.7/util/ifru.c:1224:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(++pnew,prodver,verlen);
data/ipmiutil-3.1.7/util/ifru.c:1227:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(++pnew,&pfrubuf[prodver_offset+1],verlen);
data/ipmiutil-3.1.7/util/ifru.c:1238:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(++pnew,sernum,snlen);
data/ipmiutil-3.1.7/util/ifru.c:1241:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(++pnew,&pfrubuf[sernum_offset+1],snlen);
data/ipmiutil-3.1.7/util/ifru.c:1253:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(++pnew,tag,alen);
data/ipmiutil-3.1.7/util/ifru.c:1256:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(++pnew,&pfrubuf[asset_offset+1],alen);
data/ipmiutil-3.1.7/util/ifru.c:1304:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pnew,pfru,mult_len);
data/ipmiutil-3.1.7/util/ifru.c:1367:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   memcpy(sdr,&rdata[2],len);
data/ipmiutil-3.1.7/util/ifru.c:1392:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   	   memcpy(&sdr[len],&rdata[2],sresp);
data/ipmiutil-3.1.7/util/ifru.c:1419:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char idstr[32];
data/ipmiutil-3.1.7/util/ifru.c:1429:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(idstr,&sdr[SDR_STR_OFF],ilen);
data/ipmiutil-3.1.7/util/ifru.c:1531:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buff[256];
data/ipmiutil-3.1.7/util/ifru.c:1539:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen(infile,"r");
data/ipmiutil-3.1.7/util/ifru.c:1583:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		   sz = atoi(p1);
data/ipmiutil-3.1.7/util/ifru.c:1588:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		   sfru = atoi(p1);  /*global sfru*/
data/ipmiutil-3.1.7/util/ifru.c:1639:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char biosver[80];
data/ipmiutil-3.1.7/util/ifru.c:1651:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char devstr[32];
data/ipmiutil-3.1.7/util/ifru.c:2014:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char infostr[64];
data/ipmiutil-3.1.7/util/ifru.c:2037:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(binfile,"wb");
data/ipmiutil-3.1.7/util/ifru.c:2039:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(binfile,"w");
data/ipmiutil-3.1.7/util/ifru.c:2059:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(binfile,"rb");
data/ipmiutil-3.1.7/util/ifru.c:2061:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(binfile,"r");
data/ipmiutil-3.1.7/util/ifruset.c:139:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char   chassis_name[FIELD_LEN] = {0};
data/ipmiutil-3.1.7/util/ifruset.c:144:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tag[FIELD_LEN];
data/ipmiutil-3.1.7/util/ifruset.c:184:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *ctypes[MAX_CTYPE] = { "", "Other", "Unknown", "Desktop", 
data/ipmiutil-3.1.7/util/ifruset.c:195:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *chassis[NUM_CHASSIS_FIELDS] = {
data/ipmiutil-3.1.7/util/ifruset.c:199:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *board[NUM_BOARD_FIELDS] = {
data/ipmiutil-3.1.7/util/ifruset.c:206:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *product[NUM_PRODUCT_FIELDS] = {
data/ipmiutil-3.1.7/util/ifruset.c:297:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&frubuf[i],&resp[1],chunk);
data/ipmiutil-3.1.7/util/ifruset.c:313:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&guid,&resp,16);
data/ipmiutil-3.1.7/util/ifruset.c:332:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  union { uint32_t bits; char chars[4]; } u;
data/ipmiutil-3.1.7/util/ifruset.c:362:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy((void *)&u.bits, &s[i], k);
data/ipmiutil-3.1.7/util/ifruset.c:374:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(target, source, len);
data/ipmiutil-3.1.7/util/ifruset.c:461:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char devstr[20];
data/ipmiutil-3.1.7/util/ifruset.c:545:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mystr[256];
data/ipmiutil-3.1.7/util/ifruset.c:640:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(mystr,&pdata[1],dlen-1);
data/ipmiutil-3.1.7/util/ifruset.c:675:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char newstr[64];
data/ipmiutil-3.1.7/util/ifruset.c:679:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char devstr[24];
data/ipmiutil-3.1.7/util/ifruset.c:876:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(prodarea[i].tag, &frubuf[n+1] ,tl.len);
data/ipmiutil-3.1.7/util/ifruset.c:947:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&req[3],&data[i],chunk);
data/ipmiutil-3.1.7/util/ifruset.c:1033:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(pnew,pfru,j);
data/ipmiutil-3.1.7/util/ifruset.c:1063:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&pnew[1],prodarea[i].tag,j);
data/ipmiutil-3.1.7/util/ifruset.c:1162:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   memcpy(sdr,&rdata[2],sresp-2);
data/ipmiutil-3.1.7/util/ifruset.c:1180:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   	   memcpy(&sdr[len],&rdata[2],sresp);
data/ipmiutil-3.1.7/util/ifruset.c:1216:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char DevRecord[16];
data/ipmiutil-3.1.7/util/ifruset.c:1221:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char biosver[80];
data/ipmiutil-3.1.7/util/ifruset.c:1462:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char idstr[32];
data/ipmiutil-3.1.7/util/ifruset.c:1477:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(idstr,&sdr[STR_OFF],ilen);
data/ipmiutil-3.1.7/util/ifruset.c:1567:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char devstr[24];
data/ipmiutil-3.1.7/util/ifruset.c:1578:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(binfile,"wb");
data/ipmiutil-3.1.7/util/ifruset.c:1580:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(binfile,"w");
data/ipmiutil-3.1.7/util/ifruset.c:1598:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(binfile,"rb");
data/ipmiutil-3.1.7/util/ifruset.c:1600:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(binfile,"r");
data/ipmiutil-3.1.7/util/ifruset.c:1657:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy(prodarea[i].tag,prodnew[i].tag,len);
data/ipmiutil-3.1.7/util/ifwum.c:182:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char fileName[512];
data/ipmiutil-3.1.7/util/ifwum.c:183:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char firmBuf[1024*512];
data/ipmiutil-3.1.7/util/ifwum.c:265:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               strcpy((char *)fileName, argv[1]);
data/ipmiutil-3.1.7/util/ifwum.c:287:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
               strcpy((char *)fileName, argv[1]);
data/ipmiutil-3.1.7/util/ifwum.c:518:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   pFileHandle = fopen((const char *)pFileName, "rb");
data/ipmiutil-3.1.7/util/ifwum.c:551:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   pFileHandle = fopen((const char *)pFileName, "rb");
data/ipmiutil-3.1.7/util/ifwum.c:599:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char spaces[PROG_LENGTH + 1];
data/ipmiutil-3.1.7/util/ifwum.c:1054:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char txBuf[KFWUM_SMALL_BUFFER-KFWUM_OLD_CMD_OVERHEAD];
data/ipmiutil-3.1.7/util/ifwum.c:1060:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char txBuf[KFWUM_BIG_BUFFER];
data/ipmiutil-3.1.7/util/ifwum.c:1094:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(addressReq.txBuf, pFirmBuf, (* pInBufLength));
data/ipmiutil-3.1.7/util/ifwum.c:1101:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(sequenceReq.txBuf, pFirmBuf, (* pInBufLength));
data/ipmiutil-3.1.7/util/igetevent.c:210:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char idxfile[80]  = IDXFILE;
data/ipmiutil-3.1.7/util/igetevent.c:211:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char idxfile2[80] = "c:\\ipmi_evt.idx";
data/ipmiutil-3.1.7/util/igetevent.c:212:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char outfile[80] = "c:\\ipmiutil_evt.log";
data/ipmiutil-3.1.7/util/igetevent.c:216:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char idxfile[80] = "/var/lib/ipmiutil/evt.idx";
data/ipmiutil-3.1.7/util/igetevent.c:217:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char idxfile2[80] = "/usr/share/ipmiutil/evt.idx";
data/ipmiutil-3.1.7/util/igetevent.c:218:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char outfile[80] = "/var/log/ipmiutil_evt.log";
data/ipmiutil-3.1.7/util/igetevent.c:237:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *methodstr[6] = {
data/ipmiutil-3.1.7/util/igetevent.c:362:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char message[32];
data/ipmiutil-3.1.7/util/igetevent.c:564:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&sendbuf[0],buffer,mlen);
data/ipmiutil-3.1.7/util/igetevent.c:567:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&sendbuf[1],buffer,mlen);
data/ipmiutil-3.1.7/util/igetevent.c:571:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                   memcpy(evt,sendbuf,mlen);
data/ipmiutil-3.1.7/util/igetevent.c:680:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(evt,rdata,rlen);
data/ipmiutil-3.1.7/util/igetevent.c:731:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(rec,&rbuf[2],16);
data/ipmiutil-3.1.7/util/igetevent.c:760:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = fopen(idxfile,"r");
data/ipmiutil-3.1.7/util/igetevent.c:761:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (fd == NULL) fd = fopen(idxfile2,"r"); /*handle old location*/
data/ipmiutil-3.1.7/util/igetevent.c:773:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&t,&rec[3],4);
data/ipmiutil-3.1.7/util/igetevent.c:790:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = fopen(idxfile,"w");
data/ipmiutil-3.1.7/util/igetevent.c:833:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rdata,rec,16);
data/ipmiutil-3.1.7/util/igetevent.c:837:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&sel_time,&rec[3],4);
data/ipmiutil-3.1.7/util/igetevent.c:896:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	       	        memcpy(evt,rdata,rlen);
data/ipmiutil-3.1.7/util/igetevent.c:929:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sysbuf[250];
data/ipmiutil-3.1.7/util/igetevent.c:945:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char obuf[48];
data/ipmiutil-3.1.7/util/igetevent.c:1007:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        open("/dev/null",O_RDWR);
data/ipmiutil-3.1.7/util/igetevent.c:1049:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char outbuf[160];
data/ipmiutil-3.1.7/util/igetevent.c:1050:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmpout[20];
data/ipmiutil-3.1.7/util/igetevent.c:1061:26:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		    if (sdesc != NULL) strcpy(sdesc,"asy.log");
data/ipmiutil-3.1.7/util/igetevent.c:1080:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fp = fopen(run_script,"r");
data/ipmiutil-3.1.7/util/igetevent.c:1091:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 't': timeout = atoi(optarg); fsettime = 1; break; /*timeout*/
data/ipmiutil-3.1.7/util/igetevent.c:1213:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   else sprintf(tmpout,"with snum %02x",evt_snum);
data/ipmiutil-3.1.7/util/igetevent.c:1262:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fdout = fopen(outfile,"a");
data/ipmiutil-3.1.7/util/igetevent.c:1275:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fdout = fopen(outfile,"a");
data/ipmiutil-3.1.7/util/igetevent.c:1420:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char run_cmd[256];
data/ipmiutil-3.1.7/util/ihealth.c:148:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char dmiprod[32];
data/ipmiutil-3.1.7/util/ihealth.c:149:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cmd[160];
data/ipmiutil-3.1.7/util/ihealth.c:157:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(dmitmp,"r");
data/ipmiutil-3.1.7/util/ihealth.c:335:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(val,rdata,rlen);
data/ipmiutil-3.1.7/util/ihealth.c:359:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char chs_strbuf[80];
data/ipmiutil-3.1.7/util/ihealth.c:370:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(pstr,"\tchassis_power       %c ",bdelim);
data/ipmiutil-3.1.7/util/ihealth.c:371:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   if (state & 0x01) strcat(pstr,"on");
data/ipmiutil-3.1.7/util/ihealth.c:372:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   else strcat(pstr,"off");
data/ipmiutil-3.1.7/util/ihealth.c:373:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   if (state & 0x02) strcat(pstr,", overload");
data/ipmiutil-3.1.7/util/ihealth.c:374:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   if (state & 0x04) strcat(pstr,", interlock");
data/ipmiutil-3.1.7/util/ihealth.c:375:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   if (state & 0x08) strcat(pstr,", fault");
data/ipmiutil-3.1.7/util/ihealth.c:376:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   if (state & 0x10) strcat(pstr,", control error");
data/ipmiutil-3.1.7/util/ihealth.c:379:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   sprintf(pstr,"\tpwr_restore_policy  %c ",bdelim);
data/ipmiutil-3.1.7/util/ihealth.c:380:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   if (state & 0x20) strcat(pstr,"last_state");
data/ipmiutil-3.1.7/util/ihealth.c:381:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   else if (state & 0x40) strcat(pstr,"turn_on");
data/ipmiutil-3.1.7/util/ihealth.c:382:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   else strcat(pstr,"stay_off");
data/ipmiutil-3.1.7/util/ihealth.c:386:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(pstr,"\tlast_power_event    %c ",bdelim);
data/ipmiutil-3.1.7/util/ihealth.c:387:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (b2 & 0x10) strcat(pstr,"IPMI ");
data/ipmiutil-3.1.7/util/ihealth.c:388:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (b2 & 0x08) strcat(pstr,"fault ");
data/ipmiutil-3.1.7/util/ihealth.c:389:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (b2 & 0x04) strcat(pstr,"interlock ");
data/ipmiutil-3.1.7/util/ihealth.c:390:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (b2 & 0x02) strcat(pstr,"overload ");
data/ipmiutil-3.1.7/util/ihealth.c:391:22:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      if (b2 & 0x01) strcat(pstr,"ACfailed");
data/ipmiutil-3.1.7/util/ihealth.c:483:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char verstr[30];
data/ipmiutil-3.1.7/util/ihealth.c:564:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char pstr[40];
data/ipmiutil-3.1.7/util/ihealth.c:566:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   if (rec[1] & 0x01) strcat(pstr,"None ");
data/ipmiutil-3.1.7/util/ihealth.c:567:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   if (rec[1] & 0x02) strcat(pstr,"MD2 ");
data/ipmiutil-3.1.7/util/ihealth.c:568:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   if (rec[1] & 0x04) strcat(pstr,"MD5 ");
data/ipmiutil-3.1.7/util/ihealth.c:569:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   if (rec[1] & 0x10) strcat(pstr,"Straight_Passwd ");
data/ipmiutil-3.1.7/util/ihealth.c:570:23:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
   if (rec[1] & 0x20) strcat(pstr,"OEM ");
data/ipmiutil-3.1.7/util/ihealth.c:608:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char prodoem[40];
data/ipmiutil-3.1.7/util/ihealth.c:609:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char extraver[32];
data/ipmiutil-3.1.7/util/ihealth.c:658:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	         sprintf(extraver," (Boot %x.%x PIA %x.%x)", /*BMC extra*/
data/ipmiutil-3.1.7/util/ihealth.c:698:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	        sprintf(extraver,".%d (Boot %x.%x)", /*BMC extra*/
data/ipmiutil-3.1.7/util/ihealth.c:725:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	     sprintf(extraver,".%02d.%02d (FW %x.%x)",i,j,k,l);
data/ipmiutil-3.1.7/util/ihealth.c:894:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char biosver[80];
data/ipmiutil-3.1.7/util/ihealth.c:898:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char selfstr[36];
data/ipmiutil-3.1.7/util/ihealth.c:1142:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char infostr[64];
data/ipmiutil-3.1.7/util/ihpm.c:458:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char currentVersion[HPMFWUPG_VERSION_SIZE];
data/ipmiutil-3.1.7/util/ihpm.c:470:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char descString[HPMFWUPG_DESC_STRING_LENGTH];
data/ipmiutil-3.1.7/util/ihpm.c:482:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char rollbackFwVersion[HPMFWUPG_VERSION_SIZE];
data/ipmiutil-3.1.7/util/ihpm.c:494:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char deferredFwVersion[HPMFWUPG_VERSION_SIZE];
data/ipmiutil-3.1.7/util/ihpm.c:510:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char oemRspData[HPMFWUPG_OEM_LENGTH];
data/ipmiutil-3.1.7/util/ihpm.c:650:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char data[HPMFWUPG_SEND_DATA_COUNT_MAX];
data/ipmiutil-3.1.7/util/ihpm.c:694:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char imageLength[HPMFWUPG_IMAGE_SIZE_BYTE_COUNT];
data/ipmiutil-3.1.7/util/ihpm.c:934:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char           signature[HPMFWUPG_HEADER_SIGNATURE_LENGTH];
data/ipmiutil-3.1.7/util/ihpm.c:937:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char  manId[HPMFWUPG_MANUFATURER_ID_LENGTH];
data/ipmiutil-3.1.7/util/ihpm.c:938:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char  prodId[HPMFWUPG_PRODUCT_ID_LENGTH];
data/ipmiutil-3.1.7/util/ihpm.c:939:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char  time[HPMFWUPG_TIME_LENGTH];
data/ipmiutil-3.1.7/util/ihpm.c:964:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char  compRevision[HPMFWUPG_COMP_REVISION_LENGTH];
data/ipmiutil-3.1.7/util/ihpm.c:965:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char  firmRevision[HPMFWUPG_FIRM_REVISION_LENGTH];
data/ipmiutil-3.1.7/util/ihpm.c:995:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char version[HPMFWUPG_FIRM_REVISION_LENGTH];
data/ipmiutil-3.1.7/util/ihpm.c:996:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char          desc[HPMFWUPG_DESCRIPTION_LENGTH];
data/ipmiutil-3.1.7/util/ihpm.c:997:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char length[HPMFWUPG_FIRMWARE_SIZE_LENGTH];
data/ipmiutil-3.1.7/util/ihpm.c:1051:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char targetAux[4];
data/ipmiutil-3.1.7/util/ihpm.c:1054:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rollbackAux[4];
data/ipmiutil-3.1.7/util/ihpm.c:1057:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char imageAux[4];
data/ipmiutil-3.1.7/util/ihpm.c:1061:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char descString[15];
data/ipmiutil-3.1.7/util/ihpm.c:1158:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char userInput[2];
data/ipmiutil-3.1.7/util/ihpm.c:1268:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char descString[12];
data/ipmiutil-3.1.7/util/ihpm.c:1638:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char md[HPMFWUPG_MD5_SIGNATURE_LENGTH];
data/ipmiutil-3.1.7/util/ihpm.c:1826:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&pFwupgCtx->targetCap,
data/ipmiutil-3.1.7/util/ihpm.c:1896:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&pFwupgCtx->genCompProp[componentId],
data/ipmiutil-3.1.7/util/ihpm.c:2428:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&uploadCmd.req.data, pData, bufLength);
data/ipmiutil-3.1.7/util/ihpm.c:2631:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   FILE* pImageFile = fopen(imageFilename, "rb");
data/ipmiutil-3.1.7/util/ihpm.c:2679:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(pGetDevId, rsp->data, sizeof(struct ipm_devid_rsp));
data/ipmiutil-3.1.7/util/ihpm.c:2716:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&pCtx->resp, rsp->data, sizeof(struct HpmfwupgGetTargetUpgCapabilitiesResp));
data/ipmiutil-3.1.7/util/ihpm.c:2801:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&pCtx->resp, rsp->data, sizeof(struct HpmfwupgGetGeneralPropResp));
data/ipmiutil-3.1.7/util/ihpm.c:2819:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&pCtx->resp, rsp->data, sizeof(struct HpmfwupgGetCurrentVersionResp));
data/ipmiutil-3.1.7/util/ihpm.c:2832:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&pCtx->resp, rsp->data, sizeof(struct HpmfwupgGetDescStringResp));
data/ipmiutil-3.1.7/util/ihpm.c:2839:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&pCtx->resp, rsp->data, sizeof(struct HpmfwupgGetRollbackFwVersionResp));
data/ipmiutil-3.1.7/util/ihpm.c:2852:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&pCtx->resp, rsp->data, sizeof(struct HpmfwupgGetDeferredFwVersionResp));
data/ipmiutil-3.1.7/util/ihpm.c:2866:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&pCtx->resp, rsp->data, sizeof(struct HpmfwupgGetOemProperties));
data/ipmiutil-3.1.7/util/ihpm.c:3184:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&pCtx->resp, rsp->data, sizeof(struct HpmfwupgGetUpgradeStatusResp));
data/ipmiutil-3.1.7/util/ihpm.c:3336:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&pCtx->resp, rsp->data, sizeof(struct HpmfwupgQueryRollbackStatusResp));
data/ipmiutil-3.1.7/util/ihpm.c:3433:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
         memcpy(&pCtx->resp, rsp->data, sizeof(struct HpmfwupgQuerySelftestResultResp));
data/ipmiutil-3.1.7/util/ihpm.c:3830:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                componentId = atoi(argv[i+1]);
data/ipmiutil-3.1.7/util/ihpm.c:3963:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    g_channel_buf_size = atoi(optarg);
data/ipmiutil-3.1.7/util/ilan.c:384:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char rghostname[32] = { '\0' };
data/ipmiutil-3.1.7/util/ilan.c:386:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char rgcommunity[19] = "public";	/* default community */
data/ipmiutil-3.1.7/util/ilan.c:388:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char passwordData[PSW_MAX + 1] =
data/ipmiutil-3.1.7/util/ilan.c:397:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifname[64] = "Local Area Connection ";	/* interface name */
data/ipmiutil-3.1.7/util/ilan.c:398:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifpattn[25] = "Local Area Connection ";
data/ipmiutil-3.1.7/util/ilan.c:403:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifname[16] = "eri0";	/* SPARC interface name */
data/ipmiutil-3.1.7/util/ilan.c:404:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifname0[16] = "eri0";
data/ipmiutil-3.1.7/util/ilan.c:405:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifpattn[14] = "eri";
data/ipmiutil-3.1.7/util/ilan.c:407:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifname[16] = "e1000g0";	/* Solaris x86 interface name */
data/ipmiutil-3.1.7/util/ilan.c:408:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifname0[16] = "e1000g0";
data/ipmiutil-3.1.7/util/ilan.c:409:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifpattn[14] = "e1000g";
data/ipmiutil-3.1.7/util/ilan.c:413:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifname[16] = "em0";	/* interface name */
data/ipmiutil-3.1.7/util/ilan.c:414:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifname0[16] = "em0";
data/ipmiutil-3.1.7/util/ilan.c:415:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifpattn[14] = "em";
data/ipmiutil-3.1.7/util/ilan.c:418:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifname[16] = "lan0";	/* interface name */
data/ipmiutil-3.1.7/util/ilan.c:419:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifname0[16] = "lan0";
data/ipmiutil-3.1.7/util/ilan.c:420:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifpattn[14] = "lan";
data/ipmiutil-3.1.7/util/ilan.c:423:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifname[16] = "eth0";	/* interface name */
data/ipmiutil-3.1.7/util/ilan.c:424:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifname0[16] = "eth0";
data/ipmiutil-3.1.7/util/ilan.c:425:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ifpattn[14] = "eth";
data/ipmiutil-3.1.7/util/ilan.c:478:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *pefdesc1[MAXPEF] = {	/* for Sahalee BMC */
data/ipmiutil-3.1.7/util/ilan.c:512:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *pefdesc2[MAXPEF] = {	/* for NSC miniBMC */
data/ipmiutil-3.1.7/util/ilan.c:548:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char canon_param[NLAN] = { 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 1, 1, 0, 0, 1, 0, 0, 1, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1 };
data/ipmiutil-3.1.7/util/ilan.c:552:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char desc[28];
data/ipmiutil-3.1.7/util/ilan.c:599:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char desc[28];
data/ipmiutil-3.1.7/util/ilan.c:632:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat (s, "None ");
data/ipmiutil-3.1.7/util/ilan.c:634:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat (s, "MD2 ");
data/ipmiutil-3.1.7/util/ilan.c:636:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat (s, "MD5 ");
data/ipmiutil-3.1.7/util/ilan.c:638:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat (s, "Pswd ");
data/ipmiutil-3.1.7/util/ilan.c:640:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat (s, "OEM ");
data/ipmiutil-3.1.7/util/ilan.c:665:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (pLanRecord, &responseData[0], responseLength);
data/ipmiutil-3.1.7/util/ilan.c:699:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (pLanRecord, &responseData[0], responseLength);
data/ipmiutil-3.1.7/util/ilan.c:759:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char aname[17];
data/ipmiutil-3.1.7/util/ilan.c:791:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (&inputData[1], uname, strlen (uname));
data/ipmiutil-3.1.7/util/ilan.c:832:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char apsw[PSW_MAX + 1];
data/ipmiutil-3.1.7/util/ilan.c:1111:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (pLanRecord, &responseData[1], responseLength - 1);
data/ipmiutil-3.1.7/util/ilan.c:1161:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (pLanRecord, &responseData[1], n);
data/ipmiutil-3.1.7/util/ilan.c:1200:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&inputData[2], pLanRecord, reqlen);
data/ipmiutil-3.1.7/util/ilan.c:1270:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (pPefRecord, &responseData[1], n);
data/ipmiutil-3.1.7/util/ilan.c:1305:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&inputData[1], pPefRecord, sizeof (PEF_RECORD));
data/ipmiutil-3.1.7/util/ilan.c:1559:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char str[8];
data/ipmiutil-3.1.7/util/ilan.c:1831:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (rgmymac, AdapterList->PhysicalAddress, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:1832:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (osmyip, &si->sin_addr.s_addr, 4);
data/ipmiutil-3.1.7/util/ilan.c:1833:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (osmymac, AdapterList->PhysicalAddress, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:1876:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (ipaddr, &si->sin_addr.s_addr, 4);
data/ipmiutil-3.1.7/util/ilan.c:1878:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (macadr, AdapterList->PhysicalAddress, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:1930:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (rgmyip, &si->sin_addr.s_addr, 4);
data/ipmiutil-3.1.7/util/ilan.c:1931:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (osmyip, &si->sin_addr.s_addr, 4);
data/ipmiutil-3.1.7/util/ilan.c:1932:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (osmymac, AdapterList->PhysicalAddress, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:1989:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (rgmyip, &si->sin_addr.s_addr, 4);
data/ipmiutil-3.1.7/util/ilan.c:1990:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (rgmymac, AdapterList->PhysicalAddress, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:1992:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (osmyip, &si->sin_addr.s_addr, 4);
data/ipmiutil-3.1.7/util/ilan.c:1993:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (osmymac, AdapterList->PhysicalAddress, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:2012:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (macadr, macadrin, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:2045:9:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bcopy(source, destination, length) memcpy(destination, source, length)
data/ipmiutil-3.1.7/util/ilan.c:2045:44:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define bcopy(source, destination, length) memcpy(destination, source, length)
data/ipmiutil-3.1.7/util/ilan.c:2124:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((*fd = open (dev, O_RDWR)) == -1) {
data/ipmiutil-3.1.7/util/ilan.c:2151:3:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  bcopy ((u_char *) bind_ack + bind_ack->dl_addr_offset, addr,
data/ipmiutil-3.1.7/util/ilan.c:2173:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (osmymac, addr, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:2217:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char szDeviceName[16];	/* MAX_DEVICE_NAME_LENGTH + 1 */
data/ipmiutil-3.1.7/util/ilan.c:2221:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (macadr, macadrin, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:2277:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (macsav, pb, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:2284:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (ipsav, &ifr.ifr_addr.sa_data[2], 4);
data/ipmiutil-3.1.7/util/ilan.c:2290:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (osmymac, macsav, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:2292:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (osmyip, ipsav, 4);
data/ipmiutil-3.1.7/util/ilan.c:2297:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (osmymac, macsav, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:2299:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (osmyip, ipsav, 4);
data/ipmiutil-3.1.7/util/ilan.c:2302:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (mactmp, osmymac, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:2306:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (osmymac, macsav, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:2307:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (osmyip, ipsav, 4);
data/ipmiutil-3.1.7/util/ilan.c:2526:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy (&DestIp, ipadr, 4);
data/ipmiutil-3.1.7/util/ilan.c:2534:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (macadr, bPhysAddr, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:2541:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (macadr, rggwymac, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:2574:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[1024];
data/ipmiutil-3.1.7/util/ilan.c:2577:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arping_cmd[128];
data/ipmiutil-3.1.7/util/ilan.c:2603:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fparp = fopen (alertfile, "r");
data/ipmiutil-3.1.7/util/ilan.c:2637:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (macadr, rggwymac, 6);	/* get to it from the default gateway */
data/ipmiutil-3.1.7/util/ilan.c:2646:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[1024];
data/ipmiutil-3.1.7/util/ilan.c:2649:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arping_cmd[128];
data/ipmiutil-3.1.7/util/ilan.c:2675:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fparp = fopen (alertfile, "r");
data/ipmiutil-3.1.7/util/ilan.c:2711:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (macadr, rggwymac, 6);	/* get to it from the default gateway */
data/ipmiutil-3.1.7/util/ilan.c:2720:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[1024];
data/ipmiutil-3.1.7/util/ilan.c:2723:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char arping_cmd[128];
data/ipmiutil-3.1.7/util/ilan.c:2755:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fparp = fopen (alertfile, "r");
data/ipmiutil-3.1.7/util/ilan.c:2802:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (macadr, rggwymac, 6);	/* get to it from the default gateway */
data/ipmiutil-3.1.7/util/ilan.c:2840:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (rgsubnet, &(pIPAddrTable->table[i].dwMask), 4);
data/ipmiutil-3.1.7/util/ilan.c:2909:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (rggwyip, &gwaddr, 4);
data/ipmiutil-3.1.7/util/ilan.c:2962:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (rgmymac, bmcmymac, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:2987:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (rgmyip, bmcmyip, 4);
data/ipmiutil-3.1.7/util/ilan.c:2991:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (rgmymac, bmcmymac, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:2999:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (rgmyip, bmcmyip, 4);
data/ipmiutil-3.1.7/util/ilan.c:3003:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (rgmymac, bmcmymac, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:3076:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char gate_addr[128];
data/ipmiutil-3.1.7/util/ilan.c:3077:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char iface[16];
data/ipmiutil-3.1.7/util/ilan.c:3078:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char defcommunity[19] = "public";
data/ipmiutil-3.1.7/util/ilan.c:3079:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[1024];
data/ipmiutil-3.1.7/util/ilan.c:3080:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char alertname[60];
data/ipmiutil-3.1.7/util/ilan.c:3091:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rtcmd[80];
data/ipmiutil-3.1.7/util/ilan.c:3096:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fprt = fopen (rtfile, "r");
data/ipmiutil-3.1.7/util/ilan.c:3109:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (rggwyip, bgateadr, 4);
data/ipmiutil-3.1.7/util/ilan.c:3117:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fprt = fopen (rtfile, "r");
data/ipmiutil-3.1.7/util/ilan.c:3125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mask_addr[128], net_addr[128];
data/ipmiutil-3.1.7/util/ilan.c:3150:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (rggwyip, bgateadr, 4);
data/ipmiutil-3.1.7/util/ilan.c:3172:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (rgmymac, bmcmymac, MAC_LEN);	/*use existing */
data/ipmiutil-3.1.7/util/ilan.c:3204:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (osmymac, get_ifreq_mac (&ifr), MAC_LEN);	/*OS mac */
data/ipmiutil-3.1.7/util/ilan.c:3215:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (rgmymac, bmcmymac, MAC_LEN);	/*use existing */
data/ipmiutil-3.1.7/util/ilan.c:3221:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (rgmymac, bmcmymac, MAC_LEN);	/*use existing */
data/ipmiutil-3.1.7/util/ilan.c:3223:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (rgmymac, osmymac, MAC_LEN);	/*use OS mac */
data/ipmiutil-3.1.7/util/ilan.c:3247:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy (osmyip, pc, 4);
data/ipmiutil-3.1.7/util/ilan.c:3249:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (rgmyip, osmyip, 4);
data/ipmiutil-3.1.7/util/ilan.c:3262:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (ossubnet, pc, 4);
data/ipmiutil-3.1.7/util/ilan.c:3264:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (rgsubnet, pc, 4);
data/ipmiutil-3.1.7/util/ilan.c:3275:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (osmymac, get_ifreq_mac (&ifr), MAC_LEN);	/*OS mac */
data/ipmiutil-3.1.7/util/ilan.c:3295:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy (rgmyip, bmcmyip, 4);
data/ipmiutil-3.1.7/util/ilan.c:3320:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fprt = fopen (snmpfile, "r");
data/ipmiutil-3.1.7/util/ilan.c:3397:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char arping_cmd[128];
data/ipmiutil-3.1.7/util/ilan.c:3414:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (rgdestip, bmcdestip, 4);
data/ipmiutil-3.1.7/util/ilan.c:3416:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (rgdestmac, bmcdestmac, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:3420:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (rgdestip, osmyip, 4);
data/ipmiutil-3.1.7/util/ilan.c:3423:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (rgdestmac, osmymac, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:3997:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char mystr[60];
data/ipmiutil-3.1.7/util/ilan.c:4003:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy (pdesc, "reserved");	/* else set default to detect */
data/ipmiutil-3.1.7/util/ilan.c:4008:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (pdesc, "Temperature");
data/ipmiutil-3.1.7/util/ilan.c:4011:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (pdesc, "Voltage");
data/ipmiutil-3.1.7/util/ilan.c:4014:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (pdesc, "Fan");
data/ipmiutil-3.1.7/util/ilan.c:4017:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (pdesc, "Chassis");
data/ipmiutil-3.1.7/util/ilan.c:4020:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (pdesc, "BIOS");
data/ipmiutil-3.1.7/util/ilan.c:4023:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (pdesc, "Power Supply");
data/ipmiutil-3.1.7/util/ilan.c:4026:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (pdesc, "Power Unit");
data/ipmiutil-3.1.7/util/ilan.c:4029:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (pdesc, "Memory");
data/ipmiutil-3.1.7/util/ilan.c:4032:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (pdesc, "Boot");
data/ipmiutil-3.1.7/util/ilan.c:4035:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (pdesc, "System Restart");
data/ipmiutil-3.1.7/util/ilan.c:4038:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (pdesc, "NMI");
data/ipmiutil-3.1.7/util/ilan.c:4041:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (pdesc, "Watchdog");
data/ipmiutil-3.1.7/util/ilan.c:4044:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (pdesc, "OS Critical Stop");
data/ipmiutil-3.1.7/util/ilan.c:4054:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf (pdesc, "Other[%02x]", stype);
data/ipmiutil-3.1.7/util/ilan.c:4059:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat (pdesc, " OK");
data/ipmiutil-3.1.7/util/ilan.c:4085:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mystr[80];
data/ipmiutil-3.1.7/util/ilan.c:4129:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      i = atoi (optarg);	/*set arp_ctl */
data/ipmiutil-3.1.7/util/ilan.c:4144:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      i = atoi (optarg);
data/ipmiutil-3.1.7/util/ilan.c:4154:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      i = atoi (optarg);
data/ipmiutil-3.1.7/util/ilan.c:4160:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      i = atoi (optarg);
data/ipmiutil-3.1.7/util/ilan.c:4209:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      set_max_kcs_loops (atoi (optarg));
data/ipmiutil-3.1.7/util/ilan.c:4239:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      i = atoi (optarg);
data/ipmiutil-3.1.7/util/ilan.c:4245:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
      i = atoi (optarg);	/*set grat arp interval, in #sec */
data/ipmiutil-3.1.7/util/ilan.c:4660:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	  strcat (mystr, "none ");
data/ipmiutil-3.1.7/util/ilan.c:4663:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat (mystr, "PEFenable ");
data/ipmiutil-3.1.7/util/ilan.c:4665:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat (mystr, "DoEventMsgs ");
data/ipmiutil-3.1.7/util/ilan.c:4667:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat (mystr, "Delay ");
data/ipmiutil-3.1.7/util/ilan.c:4669:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat (mystr, "AlertDelay ");
data/ipmiutil-3.1.7/util/ilan.c:4696:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (pef_array[idx - 1], &PefRecord, sz);
data/ipmiutil-3.1.7/util/ilan.c:4701:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (pef_array[idx - 1], &PefRecord, sz);
data/ipmiutil-3.1.7/util/ilan.c:4759:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat (mystr, "PEFenable ");
data/ipmiutil-3.1.7/util/ilan.c:4761:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat (mystr, "DoEventMsgs ");
data/ipmiutil-3.1.7/util/ilan.c:4763:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat (mystr, "Delay ");
data/ipmiutil-3.1.7/util/ilan.c:4765:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat (mystr, "AlertDelay ");
data/ipmiutil-3.1.7/util/ilan.c:4773:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat (mystr, "Alert ");
data/ipmiutil-3.1.7/util/ilan.c:4775:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat (mystr, "PwrDn ");
data/ipmiutil-3.1.7/util/ilan.c:4777:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat (mystr, "Reset ");
data/ipmiutil-3.1.7/util/ilan.c:4779:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat (mystr, "PwrCyc ");
data/ipmiutil-3.1.7/util/ilan.c:4781:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat (mystr, "OEM ");
data/ipmiutil-3.1.7/util/ilan.c:4783:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	    strcat (mystr, "DiagInt ");
data/ipmiutil-3.1.7/util/ilan.c:4804:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      sprintf (mystr, "Chan[%d] Dest[%d] ", ((j & 0xf0) >> 4),
data/ipmiutil-3.1.7/util/ilan.c:4806:8:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	      strcat (mystr, "Enabled ");
data/ipmiutil-3.1.7/util/ilan.c:4809:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	      strcpy (mystr, "Disabled ");
data/ipmiutil-3.1.7/util/ilan.c:4833:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (&PefRecord.rec_id, pef_defaults[idx - 1],
data/ipmiutil-3.1.7/util/ilan.c:4836:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (&PefRecord.rec_id, pef_array[idx - 1],
data/ipmiutil-3.1.7/util/ilan.c:4908:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (&PefRecord.action, custPEF, 18);
data/ipmiutil-3.1.7/util/ilan.c:4911:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (&PefRecord.rec_id, pef_array[idx - 1], sizeof (PEF_RECORD));
data/ipmiutil-3.1.7/util/ilan.c:4993:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy (lanparams[idx].desc, "IPMI Hostname");
data/ipmiutil-3.1.7/util/ilan.c:5069:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (bmcmyip, pc, 4);
data/ipmiutil-3.1.7/util/ilan.c:5073:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (bmcmymac, pc, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:5077:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (bmcsubnet, pc, 4);
data/ipmiutil-3.1.7/util/ilan.c:5087:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (bmcgwyip, pc, 4);
data/ipmiutil-3.1.7/util/ilan.c:5091:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (bmcgwymac, pc, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:5095:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (bmcdestip, &pc[3], 4);
data/ipmiutil-3.1.7/util/ilan.c:5097:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (bmcdestmac, &pc[7], MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:5209:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		  strcat (mystr, "ARP disabled ");
data/ipmiutil-3.1.7/util/ilan.c:5211:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		  strcat (mystr, "Grat-ARP enabled");
data/ipmiutil-3.1.7/util/ilan.c:5213:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		  strcat (mystr, "Grat-ARP disabled");
data/ipmiutil-3.1.7/util/ilan.c:5215:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		  strcat (mystr, ", ARP-resp enabled");
data/ipmiutil-3.1.7/util/ilan.c:5222:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf (mystr, "%.1f sec", f);
data/ipmiutil-3.1.7/util/ilan.c:5369:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (rgmyip, bmcmyip, 4);
data/ipmiutil-3.1.7/util/ilan.c:5532:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (&LanRecord, rgmymac, 6);
data/ipmiutil-3.1.7/util/ilan.c:5552:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (&LanRecord, rgmyip, 4);
data/ipmiutil-3.1.7/util/ilan.c:5558:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	      memcpy (&LanRecord, rgdhcpmac, MAC_LEN);
data/ipmiutil-3.1.7/util/ilan.c:5598:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (&LanRecord, rgmyip, 4);
data/ipmiutil-3.1.7/util/ilan.c:5607:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (&LanRecord, rgmymac, 6);
data/ipmiutil-3.1.7/util/ilan.c:5628:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (rgsubnet, bmcsubnet, 4);
data/ipmiutil-3.1.7/util/ilan.c:5629:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (&LanRecord, rgsubnet, 4);
data/ipmiutil-3.1.7/util/ilan.c:5714:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (rggwyip, bmcgwyip, 4);
data/ipmiutil-3.1.7/util/ilan.c:5715:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (rggwymac, bmcgwymac, 6);
data/ipmiutil-3.1.7/util/ilan.c:5719:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (&LanRecord, rggwyip, 4);
data/ipmiutil-3.1.7/util/ilan.c:5731:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (&LanRecord, bmcgwymac, 6);
data/ipmiutil-3.1.7/util/ilan.c:5734:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (&LanRecord, rggwymac, 6);
data/ipmiutil-3.1.7/util/ilan.c:5748:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (&LanRecord, rggwy2ip, 4);
data/ipmiutil-3.1.7/util/ilan.c:5756:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (&LanRecord, rggwy2mac, 6);
data/ipmiutil-3.1.7/util/ilan.c:5796:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy (rgdestip, bmcdestip, 4);
data/ipmiutil-3.1.7/util/ilan.c:5818:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy (rgdestmac, bmcdestmac, 6);
data/ipmiutil-3.1.7/util/ilan.c:5854:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (&LanRecord.data[3], rgdestip, 4);
data/ipmiutil-3.1.7/util/ilan.c:5855:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	  memcpy (&LanRecord.data[7], rgdestmac, 6);
data/ipmiutil-3.1.7/util/imbapi.c:96:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fdlog = fopen( "imbdbg.log", "a+" );
data/ipmiutil-3.1.7/util/imbapi.c:345:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fpdbg1 = fopen( "imbdbg.log", "a+" );
data/ipmiutil-3.1.7/util/imbapi.c:504:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( respDataPtr, &resp->data[7], *respDataLen);
data/ipmiutil-3.1.7/util/imbapi.c:553:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( req->req.data, reqPtr->data, reqPtr->dataLength );
data/ipmiutil-3.1.7/util/imbapi.c:607:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( respDataPtr, resp->data, *respDataLen);
data/ipmiutil-3.1.7/util/imbapi.c:737:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		    if ((hDevice1 = open(IMB_DEVICE,O_RDWR)) <0) 
data/ipmiutil-3.1.7/util/imbapi.c:1048:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( wrReq->data, reqPtr->data, reqPtr->dataLength );
data/ipmiutil-3.1.7/util/imbapi.c:1082:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( respDataPtr, resp->data, *respDataLen);
data/ipmiutil-3.1.7/util/imbapi.c:1637:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( req->req.data, reqPtr->data, reqPtr->dataLength );
data/ipmiutil-3.1.7/util/imbapi.c:1786:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy( msgPtr, resp->data, respLength );
data/ipmiutil-3.1.7/util/imbapi.c:1804:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(msgPtr, &(resp->data[1]), respLength-1);
data/ipmiutil-3.1.7/util/imbapi.c:1939:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy( msgPtr, resp->data, respLength );
data/ipmiutil-3.1.7/util/imbapi.c:1973:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy( msgPtr, &(resp->data[2]), respLength-1 );
data/ipmiutil-3.1.7/util/imbapi.c:2177:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy( msgPtr, resp->data, respLength );
data/ipmiutil-3.1.7/util/imbapi.c:2473:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if ( (fd = open("/dev/mem", O_RDONLY)) < 0) {
data/ipmiutil-3.1.7/util/imbapi.c:2474:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[128];
data/ipmiutil-3.1.7/util/imbapi.c:2495:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[128];
data/ipmiutil-3.1.7/util/imbapi.c:2537:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[128];
data/ipmiutil-3.1.7/util/ipicmg.c:395:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[5];
data/ipmiutil-3.1.7/util/ipicmg.c:556:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[4];
data/ipmiutil-3.1.7/util/ipicmg.c:590:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[4];
data/ipmiutil-3.1.7/util/ipicmg.c:621:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[4];
data/ipmiutil-3.1.7/util/ipicmg.c:753:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[6];
data/ipmiutil-3.1.7/util/ipicmg.c:794:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[4];
data/ipmiutil-3.1.7/util/ipicmg.c:927:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char	 msg_data[7];
data/ipmiutil-3.1.7/util/ipicmg.c:969:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[6];
data/ipmiutil-3.1.7/util/ipicmg.c:1002:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[6];
data/ipmiutil-3.1.7/util/ipicmg.c:1045:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[6];
data/ipmiutil-3.1.7/util/ipicmg.c:1123:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[6];
data/ipmiutil-3.1.7/util/ipicmg.c:1158:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[6];
data/ipmiutil-3.1.7/util/ipicmg.c:1199:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[6];
data/ipmiutil-3.1.7/util/ipicmg.c:1230:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[6];
data/ipmiutil-3.1.7/util/ipicmg.c:1279:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[6];
data/ipmiutil-3.1.7/util/ipicmg.c:1319:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[6];
data/ipmiutil-3.1.7/util/ipicmg.c:1411:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char msg_data[11];
data/ipmiutil-3.1.7/util/ipicmg.c:1763:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					channel     = atoi(argv[2]);
data/ipmiutil-3.1.7/util/ipicmg.c:1765:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					device      = atoi(argv[3]);
data/ipmiutil-3.1.7/util/ipicmg.c:1781:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					int channel  = atoi(argv[2]);
data/ipmiutil-3.1.7/util/ipicmg.c:1782:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					int port     = atoi(argv[3]);
data/ipmiutil-3.1.7/util/ipicmg.c:1783:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					int type     = atoi(argv[4]);
data/ipmiutil-3.1.7/util/ipicmg.c:1784:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					int typeext  = atoi(argv[5]);
data/ipmiutil-3.1.7/util/ipicmg.c:1785:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					int group    = atoi(argv[6]);
data/ipmiutil-3.1.7/util/ipicmg.c:1786:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					int enable   = atoi(argv[7]);
data/ipmiutil-3.1.7/util/ipicmg.c:1789:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						device   = atoi(argv[8]);
data/ipmiutil-3.1.7/util/ipicmg.c:1959:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					clk_id = atoi(argv[2]);
data/ipmiutil-3.1.7/util/ipicmg.c:1961:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						clk_res = atoi(argv[3]);
data/ipmiutil-3.1.7/util/ipicmg.h:48:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char linkInfo[3];
data/ipmiutil-3.1.7/util/ipmi_port.c:57:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open("/dev/null",O_RDWR);
data/ipmiutil-3.1.7/util/ipmi_sample.c:108:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char nod[40]; char usr[24]; char psw[24];
data/ipmiutil-3.1.7/util/ipmi_sample.c:108:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char nod[40]; char usr[24]; char psw[24];
data/ipmiutil-3.1.7/util/ipmi_sample.c:108:32:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char nod[40]; char usr[24]; char psw[24];
data/ipmiutil-3.1.7/util/ipmi_sample.c:109:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char drvtyp[10];
data/ipmiutil-3.1.7/util/ipmi_sample.c:110:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char biosstr[40];
data/ipmiutil-3.1.7/util/ipmi_sample.c:134:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 'l': loops = atoi(optarg); break; 
data/ipmiutil-3.1.7/util/ipmi_sample.c:135:28:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 'i': nsec = atoi(optarg); break;  /*interval in sec*/
data/ipmiutil-3.1.7/util/ipmi_sample.c:179:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
         fp = fopen(nodefile,"r");
data/ipmiutil-3.1.7/util/ipmi_sample.c:245:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tag[17];
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:89:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char idxfile[80] = "c:\\ipmievt.idx";
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:90:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char outfile[80] = "c:\\ipmievt.log";
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:92:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char idxfile[80] = "/var/lib/ipmiutil/ipmievt.idx";
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:93:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char outfile[80] = "/var/log/ipmievt.log";
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:159:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(rec,&rbuf[2],16);
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:210:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rdata,rec,16);
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:214:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&sel_time,&rec[2],4);
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:239:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = fopen(idxfile,"r");
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:251:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&t,&rec[2],4);
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:268:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = fopen(idxfile,"w");
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:282:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char obuf[48];
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:297:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sysbuf[250];
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:322:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char outbuf[160];
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:388:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fdout = fopen(outfile,"a");
data/ipmiutil-3.1.7/util/ipmibmc.c:112:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ipmi_fd = open(pdev, O_RDWR);
data/ipmiutil-3.1.7/util/ipmibmc.c:162:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rq->data, pdata, sdata);
data/ipmiutil-3.1.7/util/ipmibmc.c:198:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(presp,rs->data,i);
data/ipmiutil-3.1.7/util/ipmicmd.c:265:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char log_name[60] = {'\0'};  /*log_name global*/
data/ipmiutil-3.1.7/util/ipmicmd.c:361:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char other_msg[25];
data/ipmiutil-3.1.7/util/ipmicmd.c:368:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(other_msg,"Other error 0x%02x",cc);
data/ipmiutil-3.1.7/util/ipmicmd.c:381:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char msgbuf[80];
data/ipmiutil-3.1.7/util/ipmicmd.c:414:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
           sprintf(msgbuf,"error %d",rv);
data/ipmiutil-3.1.7/util/ipmicmd.c:475:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(my_devid,devid,len);
data/ipmiutil-3.1.7/util/ipmicmd.c:1061:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(my_devid,presp,i); /* save device id for later use */
data/ipmiutil-3.1.7/util/ipmicmd.c:1262:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char linebuf[128];
data/ipmiutil-3.1.7/util/ipmicmd.c:1310:44:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   if (addr != NULL && lanp.addr_len != 0) memcpy(addr,lanp.addr,lanp.addr_len);
data/ipmiutil-3.1.7/util/ipmicmd.c:1340:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lanp.addr,addr,addr_len);
data/ipmiutil-3.1.7/util/ipmicmd.c:1360:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                i = atoi(popt);
data/ipmiutil-3.1.7/util/ipmicmd.c:1370:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                i = atoi(popt);
data/ipmiutil-3.1.7/util/ipmicmd.c:1375:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                i = atoi(popt);
data/ipmiutil-3.1.7/util/ipmicmd.c:1379:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                i = atoi(popt);
data/ipmiutil-3.1.7/util/ipmicmd.h:345:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node[SZGNODE+1]; 
data/ipmiutil-3.1.7/util/ipmicmd.h:346:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char user[SZGNODE+1]; 
data/ipmiutil-3.1.7/util/ipmicmd.h:347:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pswd[PSW_MAX+1]; 
data/ipmiutil-3.1.7/util/ipmicmd.h:351:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char addr[128]; /* sizeof(struct sockaddr_storage) = 128 */
data/ipmiutil-3.1.7/util/ipmidir.c:290:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char line[80];
data/ipmiutil-3.1.7/util/ipmidir.c:299:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen(if_file,"r");
data/ipmiutil-3.1.7/util/ipmidir.c:300:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   if (fp == NULL) fp = fopen(if_file2,"r");
data/ipmiutil-3.1.7/util/ipmidir.c:329:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
             myinc = atoi(r);
data/ipmiutil-3.1.7/util/ipmidir.c:360:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen(lock_dir_file,"w");
data/ipmiutil-3.1.7/util/ipmidir.c:382:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen(lock_dir_file,"r"); 
data/ipmiutil-3.1.7/util/ipmidir.c:511:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (sdata > 0) memcpy(sendMsg.Data,pdata,sdata);
data/ipmiutil-3.1.7/util/ipmidir.c:521:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(presp,respMsg.Data,len);
data/ipmiutil-3.1.7/util/ipmidir.c:899:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char rx_data[64];
data/ipmiutil-3.1.7/util/ipmidir.c:985:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char rx_data[64];
data/ipmiutil-3.1.7/util/ipmidir.c:1242:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     iofd = open("/dev/io",O_RDWR);
data/ipmiutil-3.1.7/util/ipmidir.c:1277:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char rq[IPMI_REQBUF_SIZE+35] = {0,}; /*SIZE + MAX_ISA_LENGTH=35*/
data/ipmiutil-3.1.7/util/ipmidir.c:1278:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 unsigned char rp[IPMI_RSPBUF_SIZE+35] = {0,}; /*SIZE + MAX_ISA_LENGTH=35*/
data/ipmiutil-3.1.7/util/ipmilan.c:300:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 static char nodename[SZGNODE+1] = "";
data/ipmiutil-3.1.7/util/ipmilan.c:301:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 static char gnodename[SZGNODE+1] = ""; /*nodename returned after connection*/
data/ipmiutil-3.1.7/util/ipmilan.c:313:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _dest_ip[INET_ADDRSTRLEN+1];
data/ipmiutil-3.1.7/util/ipmilan.c:336:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *conn_state_str[6] = {
data/ipmiutil-3.1.7/util/ipmilan.c:496:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char ipchars[11] = "0123456789.";
data/ipmiutil-3.1.7/util/ipmilan.c:539:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char service[NI_MAXSERV];
data/ipmiutil-3.1.7/util/ipmilan.c:569:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(service, "%d", port);
data/ipmiutil-3.1.7/util/ipmilan.c:600:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(daddr, res0->ai_addr, res0->ai_addrlen);
data/ipmiutil-3.1.7/util/ipmilan.c:636:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&daddr->sin_addr.s_addr,in_ip,4);
data/ipmiutil-3.1.7/util/ipmilan.c:789:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&cmd_rq[clen],sdata,slen);
data/ipmiutil-3.1.7/util/ipmilan.c:809:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(rdata,&cmd_rs[0],rs_len);
data/ipmiutil-3.1.7/util/ipmilan.c:830:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&pbuf[blen], pwd,n);   /* password   */
data/ipmiutil-3.1.7/util/ipmilan.c:832:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&pbuf[blen],id,n);     /* session id */
data/ipmiutil-3.1.7/util/ipmilan.c:834:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&pbuf[blen],chaldata,chlen);  /* ipmi msg data, incl challenge */
data/ipmiutil-3.1.7/util/ipmilan.c:838:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&pbuf[blen],pwd,n);    /* password   */
data/ipmiutil-3.1.7/util/ipmilan.c:954:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(auth_out,password,16);
data/ipmiutil-3.1.7/util/ipmilan.c:1068:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&cbuf[0], phdr, 4);   /* copy RMCP header to buffer */
data/ipmiutil-3.1.7/util/ipmilan.c:1071:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&pdata[1],&phdr->seq_num,4);
data/ipmiutil-3.1.7/util/ipmilan.c:1073:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&pdata[5],&sess_id_tmp,4);
data/ipmiutil-3.1.7/util/ipmilan.c:1082:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(&pdata[9],iauth,16);
data/ipmiutil-3.1.7/util/ipmilan.c:1086:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pdata,&pcmd[SZ_CMD_HDR],msglen); /*copy the data*/
data/ipmiutil-3.1.7/util/ipmilan.c:1154:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   memcpy(&pdata[j],&pcmd[SZ_CMD_HDR],sdata); /*[6]=data*/
data/ipmiutil-3.1.7/util/ipmilan.c:1177:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(phdr->auth_code,iauth,16);
data/ipmiutil-3.1.7/util/ipmilan.c:1179:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&cbuf[0], phdr, hlen);   /* copy header to buffer */
data/ipmiutil-3.1.7/util/ipmilan.c:1304:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(presp,&rbuf[i],n);
data/ipmiutil-3.1.7/util/ipmilan.c:1514:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&phdr->sess_id,  &rbuf[1], 4);
data/ipmiutil-3.1.7/util/ipmilan.c:1515:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(phdr->challenge, &rbuf[5], 16);
data/ipmiutil-3.1.7/util/ipmilan.c:1523:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&ipasswd,(uchar *)authcode,authcode_len); /* AuthCode=passwd */
data/ipmiutil-3.1.7/util/ipmilan.c:1524:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(phdr->password,&ipasswd,16);              /* save password */
data/ipmiutil-3.1.7/util/ipmilan.c:1532:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(phdr->password,ipasswd,16); 
data/ipmiutil-3.1.7/util/ipmilan.c:1536:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&ibuf[2],phdr->challenge,16); /*copy challenge string to data*/
data/ipmiutil-3.1.7/util/ipmilan.c:1559:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&phdr->sess_id,&rbuf[2],4);  /* save new session id */
data/ipmiutil-3.1.7/util/ipmilan.c:1597:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ibuf,&session_id,4);
data/ipmiutil-3.1.7/util/ipmilan.c:1678:7:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = open("/dev/urandom", O_RDONLY);
data/ipmiutil-3.1.7/util/ipmilan.c:1686:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data,&fd,len);
data/ipmiutil-3.1.7/util/ipmilan.c:1950:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(presp,&cmd_rs[1],rlen);
data/ipmiutil-3.1.7/util/ipmilan.c:2025:14:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        else memcpy(&temp[0], password,16); /*16-byte password*/
data/ipmiutil-3.1.7/util/ipmilan.c:2047:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( dst, src, len );
data/ipmiutil-3.1.7/util/ipmilan.c:2065:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy( dst, src, len );
data/ipmiutil-3.1.7/util/ipmilan.c:2144:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&pdata[0], phdr, 4);   /* copy RMCP header to buffer */
data/ipmiutil-3.1.7/util/ipmilan.c:2150:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&pdata[5],&phdr->seq_num,4);  /*session sequence number*/
data/ipmiutil-3.1.7/util/ipmilan.c:2152:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&pdata[9],&sess_id_tmp,4);    /*session id*/
data/ipmiutil-3.1.7/util/ipmilan.c:2162:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&pdata[5],buffer,len);
data/ipmiutil-3.1.7/util/ipmilan.c:2182:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(&pdata[13],iauth,16);
data/ipmiutil-3.1.7/util/ipmilan.c:2304:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rsp->data,pdata,rlen);
data/ipmiutil-3.1.7/util/ipmilan.c:2372:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(&idata[i],pdata,sdata);
data/ipmiutil-3.1.7/util/ipmilan.c:2429:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(presp,&rdata[i],rlen);
data/ipmiutil-3.1.7/util/ipmilanplus.c:185:10:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         strcpy(intf->name,"lanplus");
data/ipmiutil-3.1.7/util/ipmilanplus.c:317:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            rv = intf->open(intf);
data/ipmiutil-3.1.7/util/ipmilanplus.c:412:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(presp,rsp->data,n);
data/ipmiutil-3.1.7/util/ipmilanplus.c:681:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(v2_payload.payload.sol_packet.data,payload,len);
data/ipmiutil-3.1.7/util/ipmild.c:102:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ipmi_fd = open(pdev, O_RDWR);
data/ipmiutil-3.1.7/util/ipmild.c:106:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        ipmi_fd = open(pdev, O_RDWR);
data/ipmiutil-3.1.7/util/ipmilipmi.c:102:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ipmi_fd = open(pdev, O_RDWR);
data/ipmiutil-3.1.7/util/ipmilipmi.c:140:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(reqrsp.req.data, pdata, sdata); 
data/ipmiutil-3.1.7/util/ipmilipmi.c:159:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(presp, reqrsp.rsp.data, len);
data/ipmiutil-3.1.7/util/ipmims.cpp:435:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(psa->pvData,pdata,sdata);
data/ipmiutil-3.1.7/util/ipmimv.c:123:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char  data[IPMI_MAX_ADDR_SIZE];
data/ipmiutil-3.1.7/util/ipmimv.c:274:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ipmi_fd = open("/dev/ipmi/0", O_RDWR);
data/ipmiutil-3.1.7/util/ipmimv.c:278:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ipmi_fd = open(pdev, O_RDWR);
data/ipmiutil-3.1.7/util/ipmimv.c:283:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ipmi_fd = open(pdev, O_RDWR);
data/ipmiutil-3.1.7/util/ipmimv.c:288:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		ipmi_fd = open(pdev, O_RDWR);
data/ipmiutil-3.1.7/util/ipmimv.c:521:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(presp,&buf[1],rlen);
data/ipmiutil-3.1.7/util/ipmimv.c:598:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(&presp[j],&buf[0],rlen);
data/ipmiutil-3.1.7/util/ipmimv.c:605:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(presp,&buf[1],rlen);
data/ipmiutil-3.1.7/util/ipmimv.c:733:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(&evt_data[3],&data[0],n);
data/ipmiutil-3.1.7/util/ipmimv.c:736:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	    memcpy(&rsp_addr,rsp.addr,rsp.addr_len);
data/ipmiutil-3.1.7/util/ipmimv.c:746:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
               memcpy(evt_data,&data[0],n);
data/ipmiutil-3.1.7/util/ipmiutil.c:67:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tag[16];
data/ipmiutil-3.1.7/util/ipmiutil.c:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char desc[64];
data/ipmiutil-3.1.7/util/ipmiutil.c:182:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	 char mycmd[80];
data/ipmiutil-3.1.7/util/ipmiutil.c:226:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char tag[30];
data/ipmiutil-3.1.7/util/ireset.c:270:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char initmsg[80];
data/ipmiutil-3.1.7/util/ireset.c:361:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
           char initcmd[16];
data/ipmiutil-3.1.7/util/ireset.c:387:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(initcmd,"init %c",initchar);
data/ipmiutil-3.1.7/util/ireset.c:549:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 'j': mfg = atoi(optarg);     /*IANA number*/
data/ipmiutil-3.1.7/util/ireset.c:617:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      if (mfg == 0) memcpy(iana,&devrec[6],3); /*not set, use default*/
data/ipmiutil-3.1.7/util/isel.c:173:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char idxfile[80] = IDXFILE;
data/ipmiutil-3.1.7/util/isel.c:174:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char idxfile2[80] = "%ipmiutildir%\\sel.idx";
data/ipmiutil-3.1.7/util/isel.c:176:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char idxfile[80]  = "/var/lib/ipmiutil/sel.idx";
data/ipmiutil-3.1.7/util/isel.c:177:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char idxfile2[80] = "/usr/share/ipmiutil/sel.idx"; /*old location*/
data/ipmiutil-3.1.7/util/isel.c:300:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(selRecord,&responseData[RECORD_BASE],16);
data/ipmiutil-3.1.7/util/isel.c:346:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(idata,selrec,ilen);
data/ipmiutil-3.1.7/util/isel.c:379:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = fopen(idxfile,"r");
data/ipmiutil-3.1.7/util/isel.c:380:23:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	if (fd == NULL) fd = fopen(idxfile2,"r");
data/ipmiutil-3.1.7/util/isel.c:401:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fd = fopen(idxfile,"w");
data/ipmiutil-3.1.7/util/isel.c:463:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char output[160];
data/ipmiutil-3.1.7/util/isel.c:516:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		   sprintf(output,"%02x %02x %02x %02x %02x %02x %02x %02x "
data/ipmiutil-3.1.7/util/isel.c:654:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char DevRecord[16];
data/ipmiutil-3.1.7/util/isel.c:680:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                nlast = atoi(optarg);
data/ipmiutil-3.1.7/util/isel.c:800:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	   sprintf(gstr,"%02X%02X%02X%02X%02X%02X%02X%02X",
data/ipmiutil-3.1.7/util/isel.c:817:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[16];
data/ipmiutil-3.1.7/util/isel.c:826:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   else memcpy(&buf[3],addstr,len);
data/ipmiutil-3.1.7/util/isel.c:835:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   else memcpy(&buf[7],addstr,len);
data/ipmiutil-3.1.7/util/isel.c:874:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
   if (vend_param != NULL) set_iana(atoi(vend_param));
data/ipmiutil-3.1.7/util/iseltime.c:179:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[TIMESTR_SZ];
data/ipmiutil-3.1.7/util/iseltime.c:183:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(buf,"00/00/00 00:00:00");
data/ipmiutil-3.1.7/util/isensor.c:196:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *entity_id_str[NENTID] = {
data/ipmiutil-3.1.7/util/isensor.c:298:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char tmpstr[20];    /* temp string */
data/ipmiutil-3.1.7/util/isensor.c:337:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char oem_string[50] = "OEM";
data/ipmiutil-3.1.7/util/isensor.c:338:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *sensor_dstatus[N_DSTATUS] = {
data/ipmiutil-3.1.7/util/isensor.c:460:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *raid_states[9] = {  /*for sensor type 0x0d drive status */
data/ipmiutil-3.1.7/util/isensor.c:474:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *sensor_types[NSENSTYPES] = {  /*IPMI 2.0 Table 42-3*/
data/ipmiutil-3.1.7/util/isensor.c:594:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char istr[5];
data/ipmiutil-3.1.7/util/isensor.c:601:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&istr[1],str,3);
data/ipmiutil-3.1.7/util/isensor.c:630:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char unitstr[32];
data/ipmiutil-3.1.7/util/isensor.c:683:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char cstr[50];
data/ipmiutil-3.1.7/util/isensor.c:894:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(thr_data,resp,sresp);
data/ipmiutil-3.1.7/util/isensor.c:993:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(&inputData[2],thr_set,6);
data/ipmiutil-3.1.7/util/isensor.c:1070:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   memcpy(sens_data,resp,4);
data/ipmiutil-3.1.7/util/isensor.c:1235:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&inputData[6],&sdr[i],len);
data/ipmiutil-3.1.7/util/isensor.c:1342:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   memcpy(&resp[off],&respchunk[2],thislen);
data/ipmiutil-3.1.7/util/isensor.c:1360:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(recdata,&resp[0],reclen);
data/ipmiutil-3.1.7/util/isensor.c:1383:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char buff[255];
data/ipmiutil-3.1.7/util/isensor.c:1387:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
   fp = fopen(sdrfile,"r");
data/ipmiutil-3.1.7/util/isensor.c:1426:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&sdrbuf[isdr],hbuf,i);
data/ipmiutil-3.1.7/util/isensor.c:1551:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(psdr,sdr,len);
data/ipmiutil-3.1.7/util/isensor.c:1593:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmp[17];
data/ipmiutil-3.1.7/util/isensor.c:1595:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(tmp,&sdr[k],(len - k));
data/ipmiutil-3.1.7/util/isensor.c:1601:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(psdr,sdr,len);
data/ipmiutil-3.1.7/util/isensor.c:1635:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   if (rv == 0) memcpy(psdr,sdr,len);
data/ipmiutil-3.1.7/util/isensor.c:1658:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   if (rv == 0) memcpy(psdr,sdr,len);
data/ipmiutil-3.1.7/util/isensor.c:1928:23:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
   if (itype <= 0x0f) sprintf(retstr,"IRQ_%d",itype);
data/ipmiutil-3.1.7/util/isensor.c:1930:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(retstr,"PCI-A");
data/ipmiutil-3.1.7/util/isensor.c:1933:28:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   else if (itype == 0x14) strcpy(retstr,"SMI");
data/ipmiutil-3.1.7/util/isensor.c:1934:28:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   else if (itype == 0x15) strcpy(retstr,"SCI");
data/ipmiutil-3.1.7/util/isensor.c:1936:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(retstr,"SysInt_%d",itype-0x20);
data/ipmiutil-3.1.7/util/isensor.c:1937:28:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   else if (itype == 0x60) strcpy(retstr,"ACPI/PnP");
data/ipmiutil-3.1.7/util/isensor.c:1938:28:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   else if (itype == 0xFF) strcpy(retstr,"NoInt");
data/ipmiutil-3.1.7/util/isensor.c:1939:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
   else strcpy(retstr,"Invalid");
data/ipmiutil-3.1.7/util/isensor.c:2023:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char str[128] = "";
data/ipmiutil-3.1.7/util/isensor.c:2024:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char part[24]; /* ~15 bytes used */
data/ipmiutil-3.1.7/util/isensor.c:2026:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char sep[4];
data/ipmiutil-3.1.7/util/isensor.c:2030:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(sep,"%c ",bdelim);
data/ipmiutil-3.1.7/util/isensor.c:2041:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(str,"%.2f:%.2f:%.2f:%.2f:%.2f:%.2f",i0,i1,i2,i3,i4,i5);
data/ipmiutil-3.1.7/util/isensor.c:2260:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char customstr[35];
data/ipmiutil-3.1.7/util/isensor.c:2462:32:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	   if ((reading & 0x01) != 0) strcat(customstr,",Fault");
data/ipmiutil-3.1.7/util/isensor.c:2463:34:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
	   if ((reading & 0x0100) != 0) strcat(customstr,",Disabled");
data/ipmiutil-3.1.7/util/isensor.c:2567:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char stype_str[STYPSZ+1];
data/ipmiutil-3.1.7/util/isensor.c:2590:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char idstr[32];
data/ipmiutil-3.1.7/util/isensor.c:2602:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char rdgstr[50];
data/ipmiutil-3.1.7/util/isensor.c:2615:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(idstr,"INIT");  /*always set idstr to some initial string*/
data/ipmiutil-3.1.7/util/isensor.c:2637:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(idstr,&sdr[ioff],ilen);
data/ipmiutil-3.1.7/util/isensor.c:2692:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	   sprintf(sep,"%c ",bdelim);
data/ipmiutil-3.1.7/util/isensor.c:2749:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(idstr,&sdr[ioff],ilen);
data/ipmiutil-3.1.7/util/isensor.c:2757:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	      sprintf(&idstr[ilen],"%d",j);
data/ipmiutil-3.1.7/util/isensor.c:2793:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(sep,"%c ",bdelim);
data/ipmiutil-3.1.7/util/isensor.c:2852:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(idstr,&sdr[ioff],ilen);
data/ipmiutil-3.1.7/util/isensor.c:2912:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(idstr,&sdr[ioff],ilen);
data/ipmiutil-3.1.7/util/isensor.c:2939:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(idstr,&sdr[ioff],ilen);
data/ipmiutil-3.1.7/util/isensor.c:2969:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(idstr,&sdr[ioff],ilen);
data/ipmiutil-3.1.7/util/isensor.c:3062:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lostr[20];
data/ipmiutil-3.1.7/util/isensor.c:3063:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char histr[20];
data/ipmiutil-3.1.7/util/isensor.c:3068:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(lostr,"-u 0x%02x%02x%02x%02x%02x%02x",
data/ipmiutil-3.1.7/util/isensor.c:3074:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf(lostr,"-l 0x%02x",sensor_lo);
data/ipmiutil-3.1.7/util/isensor.c:3077:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	  sprintf(histr,"-h 0x%02x",sensor_hi);
data/ipmiutil-3.1.7/util/isensor.c:3080:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = fopen(savefile,"a+");
data/ipmiutil-3.1.7/util/isensor.c:3114:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(addrdata,rdata,rlen); 
data/ipmiutil-3.1.7/util/isensor.c:3142:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		fp = fopen(binfile,"wb");
data/ipmiutil-3.1.7/util/isensor.c:3178:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(binfile,"rb");
data/ipmiutil-3.1.7/util/isensor.c:3290:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	  case 'k': loopsec = atoi(optarg); break;  /*N sec between loops*/
data/ipmiutil-3.1.7/util/isensor.c:3393:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		nloops = atoi(optarg);
data/ipmiutil-3.1.7/util/isensor.c:3531:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	 char desc[80];
data/ipmiutil-3.1.7/util/isensor.c:3532:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	 char szstr[25];
data/ipmiutil-3.1.7/util/isensor.c:3538:19:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		  if (msz == 0) strcpy(szstr,"not present");
data/ipmiutil-3.1.7/util/isensor.c:3540:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		       sprintf(szstr,"size=%dKB",(msz & 0x7FFF));
data/ipmiutil-3.1.7/util/isensor.c:3541:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		  else sprintf(szstr,"size=%dMB",msz);
data/ipmiutil-3.1.7/util/iserial.c:200:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char rguser[16]   = "root";     /* default, settable via user param */
data/ipmiutil-3.1.7/util/iserial.c:201:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char rgpasswd[PSW_LEN+1] = "password"; /* default, set via user param */
data/ipmiutil-3.1.7/util/iserial.c:207:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char desc[28];
data/ipmiutil-3.1.7/util/iserial.c:250:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char desc[28];
data/ipmiutil-3.1.7/util/iserial.c:305:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pSerRecord,&responseData[0],responseLength);
data/ipmiutil-3.1.7/util/iserial.c:335:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pSerRecord,&responseData[0],responseLength);
data/ipmiutil-3.1.7/util/iserial.c:415:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pSerRecord,&responseData[1],responseLength-1);
data/ipmiutil-3.1.7/util/iserial.c:447:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&inputData[2],pSerRecord,reqlen);
data/ipmiutil-3.1.7/util/iserial.c:499:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&inputData[0],pSerRecord,reqlen);
data/ipmiutil-3.1.7/util/iserial.c:511:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			  memcpy(pSerRecord,&responseData[1],responseLength-1);
data/ipmiutil-3.1.7/util/iserial.c:537:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&inputData[0],pSerRecord,reqlen);
data/ipmiutil-3.1.7/util/iserial.c:551:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			  memcpy(pSerRecord,&responseData[0],responseLength);
data/ipmiutil-3.1.7/util/iserial.c:645:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pSerRecord,&responseData[1],responseLength-1);
data/ipmiutil-3.1.7/util/iserial.c:677:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&inputData[2],pSerRecord,reqlen);
data/ipmiutil-3.1.7/util/iserial.c:729:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char str[8];
data/ipmiutil-3.1.7/util/iserial.c:827:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char uname[16];
data/ipmiutil-3.1.7/util/iserial.c:839:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mystr[80];
data/ipmiutil-3.1.7/util/iserial.c:868:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 'f': i = atoi(optarg);  /*flow control*/
data/ipmiutil-3.1.7/util/iserial.c:871:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 'i': i = atoi(optarg);    /*inactivity timeout*/
data/ipmiutil-3.1.7/util/iserial.c:877:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    i = atoi(optarg);
data/ipmiutil-3.1.7/util/iserial.c:908:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		    i = atoi(optarg);
data/ipmiutil-3.1.7/util/iserial.c:1158:38:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                if (authmask & 0x01) strcat(mystr,"None ");
data/ipmiutil-3.1.7/util/iserial.c:1159:38:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                if (authmask & 0x02) strcat(mystr,"MD2 ");
data/ipmiutil-3.1.7/util/iserial.c:1160:38:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                if (authmask & 0x04) strcat(mystr,"MD5 ");
data/ipmiutil-3.1.7/util/iserial.c:1161:38:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                if (authmask & 0x10) strcat(mystr,"Pswd ");
data/ipmiutil-3.1.7/util/iserial.c:1162:38:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                if (authmask & 0x20) strcat(mystr,"OEM ");
data/ipmiutil-3.1.7/util/iserial.c:1199:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
		if (c == 0) strcpy(mystr,"infinite");
data/ipmiutil-3.1.7/util/iserial.c:1200:8:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		else sprintf(mystr,"%d sec",(c * 30));
data/ipmiutil-3.1.7/util/iserial.c:1438:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   memcpy(&SerRecord.data[1],rguser,strlen(rguser));
data/ipmiutil-3.1.7/util/iserial.c:1445:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   memcpy(&SerRecord.data[2],rgpasswd,strlen(rgpasswd));
data/ipmiutil-3.1.7/util/iserial.c:1460:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	   memcpy(&SerRecord.data[2],rgpasswd,strlen(rgpasswd));
data/ipmiutil-3.1.7/util/iserial.c:1491:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	     memcpy(&SerRecord.data[2],rgpasswd,strlen(rgpasswd));
data/ipmiutil-3.1.7/util/isol.c:188:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char  sol_esc_fn[4] = {'.','b','d', '?'}; /* SOL escape functions */
data/ipmiutil-3.1.7/util/isol.c:189:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char  file_scr[80] = {""};
data/ipmiutil-3.1.7/util/isol.c:190:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char  file_trc[80] = {""};
data/ipmiutil-3.1.7/util/isol.c:191:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char  dbglog_name[40] = "isoldbg.log";
data/ipmiutil-3.1.7/util/isol.c:285:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	    char mystr[5];
data/ipmiutil-3.1.7/util/isol.c:336:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char logtmp[LOG_MSG_LENGTH];
data/ipmiutil-3.1.7/util/isol.c:732:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&ibuf[1],&sol15_wseed,4);  /*32-bit seed*/
data/ipmiutil-3.1.7/util/isol.c:769:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&ibuf[1],&sol15_wseed,4);  /*32-bit seed*/
data/ipmiutil-3.1.7/util/isol.c:926:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp_scr = fopen(file_scr,"r");
data/ipmiutil-3.1.7/util/isol.c:933:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp_trc = fopen(file_trc,"a");
data/ipmiutil-3.1.7/util/isol.c:1159:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 'k': i = atoi(optarg); /*sol keepalive timeout, default = 30*/
data/ipmiutil-3.1.7/util/isol.c:1169:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 'n': i = atoi(optarg);     /* payload_instance */
data/ipmiutil-3.1.7/util/isol.c:1178:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 's': sol_recvdelay = atoi(optarg); break; /*slow recv delay*/
data/ipmiutil-3.1.7/util/isol.c:1179:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 't': sol_retries = atoi(optarg); break;   /*timeout/retries*/
data/ipmiutil-3.1.7/util/isol.c:1180:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 'u': wait_time = atoi(optarg); break;  /*wait_time for tuning*/
data/ipmiutil-3.1.7/util/isolwin.c:241:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(buf, rg_stdin, cnt);
data/ipmiutil-3.1.7/util/itsol.c:111:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char hostname[SZGNODE]; 
data/ipmiutil-3.1.7/util/itsol.c:137:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char	data[6];
data/ipmiutil-3.1.7/util/itsol.c:191:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char    data[16];
data/ipmiutil-3.1.7/util/itsol.c:202:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data + 1, buff, length);
data/ipmiutil-3.1.7/util/itsol.c:466:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out_buff[IPMI_BUF_SIZE * 8], in_buff[IPMI_BUF_SIZE];
data/ipmiutil-3.1.7/util/itsol.c:467:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buff[IPMI_BUF_SIZE + 4];
data/ipmiutil-3.1.7/util/itsol.c:468:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mystr[NI_MAXHOST];
data/ipmiutil-3.1.7/util/itsol.c:620:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(out_buff + out_buff_fill, buff + 4, length);
data/ipmiutil-3.1.7/util/iuser.c:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uname[21];
data/ipmiutil-3.1.7/util/iuser.c:113:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (argv[0] != NULL) chan = atoi(argv[0]);
data/ipmiutil-3.1.7/util/iuser.c:149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uname[21] = {'\0'};
data/ipmiutil-3.1.7/util/iuser.c:156:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	unum = atoi(argv[0]);
data/ipmiutil-3.1.7/util/iuser.c:158:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (argv[1] != NULL) chan = atoi(argv[1]);
data/ipmiutil-3.1.7/util/iuser.c:187:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[21] = {'\0'};
data/ipmiutil-3.1.7/util/iuser.c:197:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	unum = atoi(argv[0]);
data/ipmiutil-3.1.7/util/iuser.c:206:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		priv = atoi(argv[2]);
data/ipmiutil-3.1.7/util/iuser.c:211:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (argv[3] != NULL) chan = atoi(argv[3]);
data/ipmiutil-3.1.7/util/iwdt.c:198:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *usedesc[6] = {"reserved", "BIOS FRB2", "BIOS/POST",
data/ipmiutil-3.1.7/util/iwdt.c:299:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 'a': a = atoi(optarg);      /* set wd action */
data/ipmiutil-3.1.7/util/iwdt.c:303:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 'p': a = atoi(optarg);      /* set wd preaction */
data/ipmiutil-3.1.7/util/iwdt.c:307:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 'q': a = atoi(optarg);      /* set wd pretimeout */
data/ipmiutil-3.1.7/util/iwdt.c:316:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
          case 't': t = atoi(optarg); freadonly = 0; break;  /*timeout*/
data/ipmiutil-3.1.7/util/md2.h:181:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char padding[16][16] = 
data/ipmiutil-3.1.7/util/md2.h:201:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char S[256] = 
data/ipmiutil-3.1.7/util/md2.h:328:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(M + Mlen, buf, bufcount);
data/ipmiutil-3.1.7/util/md2.h:333:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(M, buf + bufcount, IPMI_MD2_BLOCK_LEN);
data/ipmiutil-3.1.7/util/md2.h:340:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(M, buf + bufcount, Mlen);
data/ipmiutil-3.1.7/util/md2.h:345:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(M + Mlen, buf, buflen); 
data/ipmiutil-3.1.7/util/md2.h:378:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(digest, X, IPMI_MD2_DIGEST_LEN);
data/ipmiutil-3.1.7/util/md5.c:191:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(xbuf, data, 64);
data/ipmiutil-3.1.7/util/md5.c:365:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pms->buf + offset, p, copy);
data/ipmiutil-3.1.7/util/md5.c:379:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(pms->buf, p, left);
data/ipmiutil-3.1.7/util/mem_if.c:227:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
								memcpy(m_pbBIOSData,pbData,m_dwLen);
data/ipmiutil-3.1.7/util/mem_if.c:287:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		m_iDriver = open(MEM_DRIVER, O_RDONLY);
data/ipmiutil-3.1.7/util/mem_if.c:461:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&tdStartAddress,&pSmBios[SMBIOS_TABLE_ENTRY_POINT_OFFSET],4);
data/ipmiutil-3.1.7/util/mem_if.c:463:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ulSmBiosLen,&pSmBios[SMBIOS_TABLE_SIZE_OFFSET],sizeof(USHORT));
data/ipmiutil-3.1.7/util/mem_if.c:464:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ucVal,&pSmBios[SMBIOS_TABLE_SIZE_OFFSET],sizeof(UCHAR));
data/ipmiutil-3.1.7/util/mem_if.c:465:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&ucVal1,&pSmBios[SMBIOS_TABLE_SIZE_OFFSET+1],sizeof(UCHAR));
data/ipmiutil-3.1.7/util/mem_if.c:618:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dimmstr[32];
data/ipmiutil-3.1.7/util/mem_if.c:619:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bankstr[32];
data/ipmiutil-3.1.7/util/mem_if.c:691:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			   sprintf(desc,"DIMM%d%c",bank,b);
data/ipmiutil-3.1.7/util/mem_if.c:710:35:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	if ((rv != 0) && (desc != NULL)) sprintf(desc,"DIMM(%d)",dimm);
data/ipmiutil-3.1.7/util/mem_if.c:815:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&chs_str[k+1],&VirtualAddress[j],20);
data/ipmiutil-3.1.7/util/mem_if.c:890:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char biosver[80];
data/ipmiutil-3.1.7/util/oem_asus.c:145:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mybuf[64]; 
data/ipmiutil-3.1.7/util/oem_asus.c:165:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(mybuf,"%02x [%02x %02x %02x]", evt[12],data1,data2,data3);
data/ipmiutil-3.1.7/util/oem_dell.c:99:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char ActiveLOM_String[6][10] = {"None","LOM1","LOM2","LOM3","LOM4","dedicated"};
data/ipmiutil-3.1.7/util/oem_dell.c:109:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char NIC_Selection_Mode_String [4] [50] =	{	"shared",  
data/ipmiutil-3.1.7/util/oem_dell.c:360:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  infostr[256], *pos;
data/ipmiutil-3.1.7/util/oem_dell.c:937:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy (lcdstring, lcdstringblock->lcd_string.selector_0_string.data, bytes_to_copy);
data/ipmiutil-3.1.7/util/oem_dell.c:945:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy (lcdstring+string_offset, lcdstringblock->lcd_string.selector_n_data, bytes_to_copy);
data/ipmiutil-3.1.7/util/oem_dell.c:1295:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy (lcdstring, lcdstringblock->lcd_string.selector_0_string.data, bytes_to_copy);
data/ipmiutil-3.1.7/util/oem_dell.c:1305:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy (lcdstring+string_offset, lcdstringblock->lcd_string.selector_n_data, bytes_to_copy);
data/ipmiutil-3.1.7/util/oem_dell.c:1332:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lcdstring[IPMI_DELL_LCD_STRING_LENGTH_MAX+1] = {0};
data/ipmiutil-3.1.7/util/oem_dell.c:1344:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char text[IPMI_DELL_LCD_STRING_LENGTH_MAX+1] = {0};
data/ipmiutil-3.1.7/util/oem_dell.c:1457:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lcdstring[IPMI_DELL_LCD_STRING_LENGTH_MAX+1] = {0};
data/ipmiutil-3.1.7/util/oem_dell.c:1811:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy (data+4, text+bytes_stored, size_of_copy);
data/ipmiutil-3.1.7/util/oem_dell.c:1825:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy (data+2, text+bytes_stored, size_of_copy);
data/ipmiutil-3.1.7/util/oem_dell.c:2158:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(VirtualMacAddress,&rsp[1],MACADDRESSLENGH);
data/ipmiutil-3.1.7/util/oem_dell.c:2169:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(VirtualMacAddress,&rsp[1+MACADDRESSLENGH],MACADDRESSLENGH);
data/ipmiutil-3.1.7/util/oem_dell.c:2180:12:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
           memcpy(VirtualMacAddress,&rsp[VIRTUAL_MAC_OFFSET],MACADDRESSLENGH);
data/ipmiutil-3.1.7/util/oem_dell.c:2257:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(iDRAC6MacAddressByte,&rsp[PARAM_REV_OFFSET],MACADDRESSLENGH);
data/ipmiutil-3.1.7/util/oem_dell.c:2342:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&EmbeddedNICMacAddress_10G,&rsp[PARAM_REV_OFFSET+TOTAL_N0_NICS_INDEX],Total_No_NICs* MACADDRESSLENGH);
data/ipmiutil-3.1.7/util/oem_dell.c:2474:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(EmbeddedNICMacAddress.LOMMacAddress[i]),&rsp[PARAM_REV_OFFSET],len);
data/ipmiutil-3.1.7/util/oem_dell.c:2601:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nic_set[2] = {0};
data/ipmiutil-3.1.7/util/oem_dell.c:3408:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pSensorReadingData, rsp, sizeof(SensorReadingType));
data/ipmiutil-3.1.7/util/oem_dell.c:3544:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cumStartTime[26];
data/ipmiutil-3.1.7/util/oem_dell.c:3545:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char maxPeakStartTime[26];
data/ipmiutil-3.1.7/util/oem_dell.c:3546:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ampPeakTime[26];
data/ipmiutil-3.1.7/util/oem_dell.c:3547:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char wattPeakTime[26];
data/ipmiutil-3.1.7/util/oem_dell.c:3548:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bmctime[26];
data/ipmiutil-3.1.7/util/oem_dell.c:4250:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char timestr[30];
data/ipmiutil-3.1.7/util/oem_dell.c:4734:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&header, &rsp[1], 8);
data/ipmiutil-3.1.7/util/oem_dell.c:4823:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char un_str[32];
data/ipmiutil-3.1.7/util/oem_dell.c:5475:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char          dimmStr[32];
data/ipmiutil-3.1.7/util/oem_dell.c:5478:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char          tmpdesc[SIZE_OF_DESC];
data/ipmiutil-3.1.7/util/oem_dell.c:5479:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char   rgdesc[SIZE_OF_DESC];
data/ipmiutil-3.1.7/util/oem_dell.c:5535:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
							strcpy(desc,"Memory is in Spare Mode");
data/ipmiutil-3.1.7/util/oem_dell.c:5537:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
							strcpy(desc,"Memory is in Raid Mode ");
data/ipmiutil-3.1.7/util/oem_dell.c:5539:8:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
							strcpy(desc,"Memory is in Mirror Mode ");
data/ipmiutil-3.1.7/util/oem_dell.c:5681:6:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
					strcat(desc, "ECC Error,");
data/ipmiutil-3.1.7/util/oem_dell.c:5689:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
						strcpy(dimmStr, " DIMM_");
data/ipmiutil-3.1.7/util/oem_dell.c:5711:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				            sprintf(tmpdesc,"%d",dimmNum);
data/ipmiutil-3.1.7/util/oem_dell.c:5721:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				        strcpy(dimmStr, " DIMM");
data/ipmiutil-3.1.7/util/oem_dell.c:5734:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				            sprintf(tmpdesc,"%d",(i + incr + 1));
data/ipmiutil-3.1.7/util/oem_fujitsu.c:252:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    textbuf[IPMI_OEM_MAX_BYTES];
data/ipmiutil-3.1.7/util/oem_fujitsu.c:261:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timestr[40]; 
data/ipmiutil-3.1.7/util/oem_fujitsu.c:320:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&textbuf[offset],&bytes_rs[14],chunk_len);
data/ipmiutil-3.1.7/util/oem_fujitsu.c:370:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mybuf[64]; 
data/ipmiutil-3.1.7/util/oem_fujitsu.c:397:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(mybuf,"iRMC S2 CLI/Telnet user %d login from %d.%d.%d.%d",
data/ipmiutil-3.1.7/util/oem_fujitsu.c:401:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(mybuf,"iRMC S2 CLI/Telnet user %d logout from %d.%d.%d.%d",
data/ipmiutil-3.1.7/util/oem_fujitsu.c:405:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(mybuf,"iRMC S2 Event %02x %02x %02x %02x %02x %02x",
data/ipmiutil-3.1.7/util/oem_fujitsu.c:416:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(mybuf,"%02x [%02x %02x %02x]", evt[12],evt[13],evt[14],evt[15]);
data/ipmiutil-3.1.7/util/oem_fujitsu.c:421:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		      sprintf(mybuf,"CLI/Telnet user %d login", evt[15]);
data/ipmiutil-3.1.7/util/oem_fujitsu.c:424:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		      sprintf(mybuf,"CLI/Telnet user %d logout", evt[15]);
data/ipmiutil-3.1.7/util/oem_fujitsu.c:427:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		      sprintf(mybuf,"Browser user %d login", evt[15]);
data/ipmiutil-3.1.7/util/oem_fujitsu.c:430:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		      sprintf(mybuf,"Browser user %d logout", evt[15]);
data/ipmiutil-3.1.7/util/oem_fujitsu.c:433:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		      sprintf(mybuf,"Browser user %d auto-logout", evt[15]);
data/ipmiutil-3.1.7/util/oem_fujitsu.c:455:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		   sprintf(mybuf,"Firmware flash version %d.%d",
data/ipmiutil-3.1.7/util/oem_fujitsu.c:663:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  return((char *)string_array[offset]);
data/ipmiutil-3.1.7/util/oem_intel.c:76:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char tstr[12];
data/ipmiutil-3.1.7/util/oem_intel.c:77:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(tstr,"%02x",stype);
data/ipmiutil-3.1.7/util/oem_intel.c:132:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static char un_str[32];
data/ipmiutil-3.1.7/util/oem_intel.c:328:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     char desc[20];
data/ipmiutil-3.1.7/util/oem_intel.c:566:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mystr[60];
data/ipmiutil-3.1.7/util/oem_intel.c:578:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(mystr,"NM(%x,%x,%x) health=%x excep=%x capab=%x thresh=%x",
data/ipmiutil-3.1.7/util/oem_intel.c:590:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		if (reading[2] == 0x00) strcat(mystr,"None"); 
data/ipmiutil-3.1.7/util/oem_intel.c:592:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		   if (reading[2] & 0x01) strcat(mystr,"Policy "); 
data/ipmiutil-3.1.7/util/oem_intel.c:593:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		   if (reading[2] & 0x02) strcat(mystr,"Monitor "); 
data/ipmiutil-3.1.7/util/oem_intel.c:594:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		   if (reading[2] & 0x04) strcat(mystr,"Power "); 
data/ipmiutil-3.1.7/util/oem_intel.c:618:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mystr[60];
data/ipmiutil-3.1.7/util/oem_intel.c:729:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mybuf[64]; 
data/ipmiutil-3.1.7/util/oem_intel.c:730:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char oembuf[64]; 
data/ipmiutil-3.1.7/util/oem_intel.c:750:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(mybuf,"%02x [%02x %02x %02x]", evt[12],evt[13],evt[14],evt[15]);
data/ipmiutil-3.1.7/util/oem_kontron.c:178:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char chars[4];
data/ipmiutil-3.1.7/util/oem_kontron.c:242:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy((void *)&u.bits, &data[off+i], k);
data/ipmiutil-3.1.7/util/oem_kontron.c:254:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(str, &data[off], len);
data/ipmiutil-3.1.7/util/oem_kontron.c:470:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(rsp,"serialnumber");
data/ipmiutil-3.1.7/util/oem_kontron.c:491:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(sn, rsp, sn_size);
data/ipmiutil-3.1.7/util/oem_kontron.c:559:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&header, rsp + 1, 8);
data/ipmiutil-3.1.7/util/oem_kontron.c:619:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(fru_data + fru_data_offset, sn, sn_size);
data/ipmiutil-3.1.7/util/oem_kontron.c:693:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(fru_data + fru_data_offset, sn, sn_size);
data/ipmiutil-3.1.7/util/oem_kontron.c:786:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(mfg_date, rsp, 3);
data/ipmiutil-3.1.7/util/oem_kontron.c:844:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&header, &rsp[1], 8);
data/ipmiutil-3.1.7/util/oem_kontron.c:877:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(fru_data + (header.offset.board * 8) + 3, mfg_date, 3);
data/ipmiutil-3.1.7/util/oem_kontron.c:932:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char timestr[40]; 
data/ipmiutil-3.1.7/util/oem_kontron.c:933:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mybuf[64]; 
data/ipmiutil-3.1.7/util/oem_kontron.c:934:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char oembuf[64]; 
data/ipmiutil-3.1.7/util/oem_kontron.c:959:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		  sprintf(mybuf,"OEM Event %02x %02x %02x %02x %02x %02x",
data/ipmiutil-3.1.7/util/oem_kontron.c:970:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(mybuf,"%02x [%02x %02x %02x]", evt[12],evt[13],evt[14],evt[15]);
data/ipmiutil-3.1.7/util/oem_lenovo.c:134:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	      pstr = (char *)oem_ibm_events[i].desc; 
data/ipmiutil-3.1.7/util/oem_lenovo.c:333:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mybuf[64]; 
data/ipmiutil-3.1.7/util/oem_lenovo.c:354:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(mybuf,"%02x [%02x %02x %02x]", etype,data1,data2,data3);
data/ipmiutil-3.1.7/util/oem_newisys.c:81:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char description[DESC_MAX];
data/ipmiutil-3.1.7/util/oem_newisys.c:125:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(description, &rdata[4], i);
data/ipmiutil-3.1.7/util/oem_quanta.c:106:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mybuf[64]; 
data/ipmiutil-3.1.7/util/oem_quanta.c:129:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(mybuf,"%02x [%02x %02x %02x]", evt[12],evt[13],evt[14],evt[15]);
data/ipmiutil-3.1.7/util/oem_sun.c:274:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	if (prsp != NULL) memcpy(prsp,rsp,rsp_len);
data/ipmiutil-3.1.7/util/oem_sun.c:487:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	id = (ushort)atoi(argv[0]);
data/ipmiutil-3.1.7/util/oem_sun.c:671:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	id = (ushort)atoi(argv[0]);
data/ipmiutil-3.1.7/util/oem_sun.c:808:7:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fp = fopen(ifile, "r");
data/ipmiutil-3.1.7/util/oem_supermicro.c:336:19:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   if (rv == 0) { memcpy(info,rdata,rlen); }
data/ipmiutil-3.1.7/util/oem_supermicro.c:523:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char rgpair[NPAIRS] = "ABCDEFGHIJKLMNOPQRSTUVWXYZ";
data/ipmiutil-3.1.7/util/oem_supermicro.c:552:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      n = sprintf(desc,"CPU%d/DIMM%d",cpu,dimm);
data/ipmiutil-3.1.7/util/oem_supermicro.c:559:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      n = sprintf(desc,"P%d_DIMM%c%d",cpu,rgpair[pair],dimm);
data/ipmiutil-3.1.7/util/oem_supermicro.c:575:14:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
         n = sprintf(desc,"P%d_DIMM%c%d",cpu,rgpair[pair],dimm);
data/ipmiutil-3.1.7/util/oem_supermicro.c:611:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mybuf[64]; 
data/ipmiutil-3.1.7/util/oem_supermicro.c:612:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char mytype[64]; 
data/ipmiutil-3.1.7/util/oem_supermicro.c:633:6:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
     sprintf(mybuf,"%02x [%02x %02x %02x]", evt[12],evt[13],evt[14],evt[15]);
data/ipmiutil-3.1.7/util/oem_supermicro.c:647:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(mytype,"CpuTemp_%02x", d1);
data/ipmiutil-3.1.7/util/oem_supermicro.c:782:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char msg[80];
data/ipmiutil-3.1.7/util/oem_supermicro.c:848:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char DevRec[16];
data/ipmiutil-3.1.7/util/oem_supermicro.c:850:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	      n = atoi(argv[1]);  /* power supply number */
data/ipmiutil-3.1.7/util/oem_supermicro.c:868:31:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
             if (val == 0x00) strcpy(msg,"good");
data/ipmiutil-3.1.7/util/oem_supermicro.c:869:36:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
             else if (val == 0x02) strcpy(msg,"ok");
data/ipmiutil-3.1.7/util/oem_supermicro.c:870:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			 else sprintf(msg,"bad 0x%02x",val);
data/ipmiutil-3.1.7/util/subs.c:68:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char log_name[60];  /*log_name global, from ipmicmd.c*/
data/ipmiutil-3.1.7/util/subs.c:132:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static char logtmp[LOG_MSG_LENGTH];
data/ipmiutil-3.1.7/util/subs.c:203:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static char str[1024];
data/ipmiutil-3.1.7/util/subs.c:207:31:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        for (i=0; i<len; i++) sprintf(str+i+i, "%2.2x", buf[i]);
data/ipmiutil-3.1.7/util/subs.c:216:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   static char un_str[SZUN];
data/ipmiutil-3.1.7/util/subs.c:230:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        static char un_str[SZUN];
data/ipmiutil-3.1.7/util/subs.c:328:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
       fp = fopen( log_name, "a+" );
data/ipmiutil-3.1.7/util/subs.c:526:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char tmpstr[16];
data/ipmiutil-3.1.7/util/subs.c:536:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(tmpstr,instr,n);
data/ipmiutil-3.1.7/util/subs.c:631:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pbuf,rdata,rlen);
data/ipmiutil-3.1.7/util/subs.c:669:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(pbuf,&rdata[j],rlen);
data/ipmiutil-3.1.7/util/subs.c:702:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&idata[j],&pbuf[n],i);
data/ipmiutil-3.1.7/util/subs.c:753:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char *sev_str[NSEV] = {
data/ipmiutil-3.1.7/util/subs.c:815:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char *rgstrings[2] = {NULL, NULL};
data/ipmiutil-3.1.7/hpiutil/hpievent.c:105:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy ((char *)outbuff, (char *)strptr->Data, datalen);
data/ipmiutil-3.1.7/hpiutil/hpievent.c:590:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		sensor_name, strlen(sensor_name),0) >= 0)
data/ipmiutil-3.1.7/hpiutil/hpifrua.c:141:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy ((char *)outbuff, (char *)strptr->Data, datalen);
data/ipmiutil-3.1.7/hpiutil/hpifrua.c:195:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy ((char *)outbuff, (char *)dataptr->CustomField[0]->Data,
data/ipmiutil-3.1.7/hpiutil/hpifrua.c:305:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy ((char *)outbuff, (char *)dataptr->CustomField[0]->Data,
data/ipmiutil-3.1.7/hpiutil/hpifrua.c:342:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    asset_len = strlen(optarg);
data/ipmiutil-3.1.7/hpiutil/hpifrua.c:475:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		    strncpy( (char *)strptr->Data, (char *)asset_tag,asset_len);
data/ipmiutil-3.1.7/hpiutil/hpifrub.c:172:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy ((char *)outstr, (char *)strptr->Data, datalen);
data/ipmiutil-3.1.7/hpiutil/hpifrub.c:484:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    atag.tlen = strlen(optarg);
data/ipmiutil-3.1.7/hpiutil/hpifrub.c:589:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy((char *)strptr->Data, atag.tag, atag.tlen);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:562:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   j = strlen(outbuf);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:587:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		   j = strlen(outbuf);
data/ipmiutil-3.1.7/hpiutil/hpisel.c:719:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  outlen = strlen(outbuf);
data/ipmiutil-3.1.7/lib/lanplus/helper.c:470:2:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
	umask(0);
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/helper.h:95:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
# define __minlen(a, b) ({ int x=strlen(a); int y=strlen(b); (x < y) ? x : y;})
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/helper.h:95:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
# define __minlen(a, b) ({ int x=strlen(a); int y=strlen(b); (x < y) ? x : y;})
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/helper.h:99:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
# define __maxlen(a, b) ({ int x=strlen(a); int y=strlen(b); (x > y) ? x : y;})
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/helper.h:99:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
# define __maxlen(a, b) ({ int x=strlen(a); int y=strlen(b); (x > y) ? x : y;})
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_sdr.h:166:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			uint16_t read;	/* discrete reading mask */
data/ipmiutil-3.1.7/lib/lanplus/inc/ipmitool/ipmi_sdr.h:283:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				} read;
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:209:7:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
      usleep(u);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:2368:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					n = strlen(msg);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:3333:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	msg[27] = (uint8_t)strlen((const char *)session->username);
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:3680:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (session->hostname == NULL || strlen((const char *)session->hostname) == 0) {
data/ipmiutil-3.1.7/lib/lanplus/lanplus.c:3966:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = (int)strlen((const char *)data),
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt.c:100:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(int)strlen((const char *)session->username); /* optional */
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt.c:167:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buffer[57] = (uint8_t)strlen((const char *)session->username);
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt.c:441:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(int)strlen((const char *)session->username);
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt.c:477:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input_buffer[21] = (uint8_t)strlen((const char *)session->username);
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt.c:562:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		(int)strlen((const char *)session->username);
data/ipmiutil-3.1.7/lib/lanplus/lanplus_crypt.c:598:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	input_buffer[33] = (uint8_t)strlen((const char *)session->username);
data/ipmiutil-3.1.7/util/iconfig.c:1002:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    origsize = strlen(ifname) + 1;
data/ipmiutil-3.1.7/util/iconfig.c:1789:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        eol = &line[strlen(line)];
data/ipmiutil-3.1.7/util/iconfig.c:1864:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(filename,optarg,sz);
data/ipmiutil-3.1.7/util/iconfig.c:1869:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(filename,optarg,sz);
data/ipmiutil-3.1.7/util/idiscover.c:317:7:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
      usleep(u);
data/ipmiutil-3.1.7/util/idiscover.c:539:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          strncpy(ifr.ifr_name, _interface, IFNAMSIZ);
data/ipmiutil-3.1.7/util/idiscover.c:726:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		 strncpy(host,h_ent->h_name,sizeof(host));
data/ipmiutil-3.1.7/util/idiscover.c:980:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(g_startDest,optarg,MAXHOSTNAMELEN);
data/ipmiutil-3.1.7/util/idiscover.c:983:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(g_endDest,optarg,MAXHOSTNAMELEN);
data/ipmiutil-3.1.7/util/idiscover.c:986:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(g_interface,optarg,sizeof(g_interface));
data/ipmiutil-3.1.7/util/iekanalyzer.c:441:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if( strlen (argument) > MIN_ARGUMENT ){
data/ipmiutil-3.1.7/util/iekanalyzer.c:539:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               filename[type_offset] = malloc( strlen(argv[argument_offset]) + 1
data/ipmiutil-3.1.7/util/ievents.c:708:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
int strlen_(const char *s) { return((int)strlen(s)); }
data/ipmiutil-3.1.7/util/ievents.c:869:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	     strncpy(stype_desc,"OEM Board Reset", sizeof(stype_desc));
data/ipmiutil-3.1.7/util/ievents.c:956:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	strncpy(buf,"00/00/00 00:00:00",bufsz);
data/ipmiutil-3.1.7/util/ievents.c:1042:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		   strncpy(line,buff,blen);
data/ipmiutil-3.1.7/util/ievents.c:1365:4:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
   sprintf(pstr,"_");
data/ipmiutil-3.1.7/util/ievents.c:1405:4:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
   sprintf(pstr,"_");
data/ipmiutil-3.1.7/util/ievents.c:1428:4:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
   sprintf(pstr,"_");
data/ipmiutil-3.1.7/util/ievents.c:2169:6:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
		   strcat(outbuf,"\n");
data/ipmiutil-3.1.7/util/ievents.c:2368:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(rawfil,argv[1],len);
data/ipmiutil-3.1.7/util/ievents.c:2384:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(rawfil,argv[1],len);
data/ipmiutil-3.1.7/util/ievents.c:2398:14:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
             strncpy(sensfil,argv[1],len);
data/ipmiutil-3.1.7/util/ifru.c:415:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
     strncpy(target, buf2str(s, slen), len);
data/ipmiutil-3.1.7/util/ifru.c:1676:20:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                   strncpy(chassis_name,optarg,len);
data/ipmiutil-3.1.7/util/ifru.c:1688:20:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                   strncpy(ps_prod,optarg,len);
data/ipmiutil-3.1.7/util/ifru.c:1707:20:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                   strncpy(asset_tag,optarg,len);
data/ipmiutil-3.1.7/util/ifru.c:1719:20:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                   strncpy(serial_num,optarg,len);
data/ipmiutil-3.1.7/util/ifru.c:1731:20:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                   strncpy(prod_ver,optarg,len);
data/ipmiutil-3.1.7/util/ifruset.c:380:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
     strncpy(target, buf2str(s, slen), len);
data/ipmiutil-3.1.7/util/ifruset.c:552:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   i = strlen(mystr);
data/ipmiutil-3.1.7/util/ifruset.c:1242:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   len = strlen(optarg);
data/ipmiutil-3.1.7/util/ifruset.c:1244:20:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                   strncpy(chassis_name,optarg,len);
data/ipmiutil-3.1.7/util/ifruset.c:1258:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   len = strlen(optarg);
data/ipmiutil-3.1.7/util/ifruset.c:1261:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		   strncpy(prodnew[IPROD_ASSET].tag,optarg,len);
data/ipmiutil-3.1.7/util/ifruset.c:1268:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   len = strlen(optarg);
data/ipmiutil-3.1.7/util/ifruset.c:1271:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		   strncpy(prodnew[IPROD_FRUID].tag,optarg,len);
data/ipmiutil-3.1.7/util/ifruset.c:1278:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   len = strlen(optarg);
data/ipmiutil-3.1.7/util/ifruset.c:1281:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		   strncpy(prodnew[IPROD_NAME].tag,optarg,len);
data/ipmiutil-3.1.7/util/ifruset.c:1288:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   len = strlen(optarg);
data/ipmiutil-3.1.7/util/ifruset.c:1291:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		   strncpy(prodnew[IPROD_OEM].tag,optarg,len);
data/ipmiutil-3.1.7/util/ifruset.c:1298:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   len = strlen(optarg);
data/ipmiutil-3.1.7/util/ifruset.c:1301:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		   strncpy(prodnew[IPROD_PART].tag,optarg,len);
data/ipmiutil-3.1.7/util/ifruset.c:1308:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   len = strlen(optarg);
data/ipmiutil-3.1.7/util/ifruset.c:1311:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		   strncpy(prodnew[IPROD_MANUF].tag,optarg,len);
data/ipmiutil-3.1.7/util/ifruset.c:1318:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   len = strlen(optarg);
data/ipmiutil-3.1.7/util/ifruset.c:1321:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		   strncpy(prodnew[IPROD_SERNUM].tag,optarg,len);
data/ipmiutil-3.1.7/util/ifruset.c:1328:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   len = strlen(optarg);
data/ipmiutil-3.1.7/util/ifruset.c:1331:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		   strncpy(prodnew[IPROD_VERS].tag,optarg,len);
data/ipmiutil-3.1.7/util/ifwum.c:260:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if((argc >= 2) && (strlen(argv[1]) > 0))
data/ipmiutil-3.1.7/util/ifwum.c:263:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if(strlen(argv[1]) < 512)
data/ipmiutil-3.1.7/util/ifwum.c:282:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
         if((argc >= 2) && (strlen(argv[1]) > 0))
data/ipmiutil-3.1.7/util/ifwum.c:285:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if(strlen(argv[1]) < 512)
data/ipmiutil-3.1.7/util/igetevent.c:1185:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     if (strlen(ipath)+12 < sizeof(idxfile)) {
data/ipmiutil-3.1.7/util/igetevent.c:1195:11:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
          strcat(idxfile,"-");
data/ipmiutil-3.1.7/util/igetevent.c:1197:11:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
          strcat(idxfile2,"-");
data/ipmiutil-3.1.7/util/igetevent.c:1199:11:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
          strcat(outfile,"-");
data/ipmiutil-3.1.7/util/ihealth.c:531:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   strncpy(pver,verstr,verlen);
data/ipmiutil-3.1.7/util/ihealth.c:1189:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = (int)strlen(pname);
data/ipmiutil-3.1.7/util/ihealth.c:1197:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = (int)strlen(pos);
data/ipmiutil-3.1.7/util/ihealth.c:1205:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = (int)strlen(pos2);
data/ipmiutil-3.1.7/util/ihpm.c:1274:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(descString,pVersion->descString,11);
data/ipmiutil-3.1.7/util/ilan.c:791:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      memcpy (&inputData[1], uname, strlen (uname));
data/ipmiutil-3.1.7/util/ilan.c:1963:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  origsize = strlen (ifname) + 1;
data/ipmiutil-3.1.7/util/ilan.c:3153:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy (ifname, iface, 16);
data/ipmiutil-3.1.7/util/ilan.c:3370:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy (alertname, &buff[i], num);	/* save alert destination */
data/ipmiutil-3.1.7/util/ilan.c:3378:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy (rgcommunity, &buff[i], num);	/* save community */
data/ipmiutil-3.1.7/util/ilan.c:4050:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy (pdesc, p, mylen);
data/ipmiutil-3.1.7/util/ilan.c:4171:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (optarg) > (uint) i) optarg[i] = 0;
data/ipmiutil-3.1.7/util/ilan.c:4312:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (optarg) > (uint) i)
data/ipmiutil-3.1.7/util/ilan.c:4320:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (optarg) > (uint) i) optarg[i] = 0;
data/ipmiutil-3.1.7/util/ilan.c:4331:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen (optarg) > PSW_MAX)
data/ipmiutil-3.1.7/util/ilan.c:4336:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      memset (optarg, ' ', strlen (optarg));
data/ipmiutil-3.1.7/util/ilan.c:5689:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy ((char *) &LanRecord.data, rghostname, sz);
data/ipmiutil-3.1.7/util/ipmi_sample.c:151:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		if (c == 'F') strncpy(drvtyp,optarg,sizeof(drvtyp));
data/ipmiutil-3.1.7/util/ipmi_sample.c:259:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	   strncpy(tag,&sdrbuf[48],16);
data/ipmiutil-3.1.7/util/ipmi_sample.c:283:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	   strncpy(tag,&sdrbuf[48],16); /*assume full sdr tag offset*/
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:405:11:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
          strcat(idxfile,"-");
data/ipmiutil-3.1.7/util/ipmi_sample_evt.c:407:11:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
          strcat(outfile,"-");
data/ipmiutil-3.1.7/util/ipmicmd.c:1269:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
       c = getc(stdin);
data/ipmiutil-3.1.7/util/ipmicmd.c:1320:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(lanp.node,node,SZGNODE); 
data/ipmiutil-3.1.7/util/ipmicmd.c:1326:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(lanp.user,user,SZGNODE); 
data/ipmiutil-3.1.7/util/ipmicmd.c:1330:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(lanp.pswd,pswd,PSW_MAX); 
data/ipmiutil-3.1.7/util/ipmicmd.c:1386:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(lanp.node,popt,SZGNODE);  /*remote nodename */
data/ipmiutil-3.1.7/util/ipmicmd.c:1391:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(lanp.user,popt,SZGNODE);  /*remote username */
data/ipmiutil-3.1.7/util/ipmicmd.c:1394:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                memset(popt, ' ', strlen(popt));
data/ipmiutil-3.1.7/util/ipmicmd.c:1398:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(lanp.pswd,popt,PSW_MAX);  /*remote password */
data/ipmiutil-3.1.7/util/ipmicmd.c:1401:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                memset(popt, ' ', strlen(popt));
data/ipmiutil-3.1.7/util/ipmicmd.c:1407:20:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                   strncpy(lanp.pswd,p,PSW_MAX);  /*remote password */
data/ipmiutil-3.1.7/util/ipmicmd.c:1408:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   if (strlen(p) > PSW_MAX) lanp.pswd[PSW_MAX] = '\0';
data/ipmiutil-3.1.7/util/ipmicmd.c:1415:20:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                   strncpy(lanp.pswd,p,PSW_MAX);  /*remote password */
data/ipmiutil-3.1.7/util/ipmicmd.c:1416:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   if (strlen(p) > PSW_MAX) lanp.pswd[PSW_MAX] = '\0';
data/ipmiutil-3.1.7/util/ipmidir.c:133:6:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
void usleep(ulong usec)  /*missing from DOS*/
data/ipmiutil-3.1.7/util/ipmidir.c:828:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
		usleep(2 * 1000); /*sleep for 2 msec*/
data/ipmiutil-3.1.7/util/ipmidir.c:839:38:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        if (i > 0 && (i % 100) == 0) usleep(1000); /*sleep for 1 msec*/
data/ipmiutil-3.1.7/util/ipmidir.c:855:38:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        if (i > 0 && (i % 100) == 0) usleep(1000); /*sleep for 1 msec*/
data/ipmiutil-3.1.7/util/ipmidir.c:1353:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(100000);
data/ipmiutil-3.1.7/util/ipmidir.c:1447:5:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
    usleep(100000);
data/ipmiutil-3.1.7/util/ipmilan.c:501:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   n = (int)strlen(str);
data/ipmiutil-3.1.7/util/ipmilan.c:638:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	         strncpy(gnodename,node,SZGNODE);     /*but not fatal*/
data/ipmiutil-3.1.7/util/ipmilan.c:639:11:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    else strncpy(gnodename,hptr->h_name,SZGNODE);
data/ipmiutil-3.1.7/util/ipmilan.c:658:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	    strncpy(gnodename,hptr->h_name,SZGNODE);
data/ipmiutil-3.1.7/util/ipmilan.c:1492:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(&ibuf[1],username,16);
data/ipmiutil-3.1.7/util/ipmilan.c:1680:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        rv = read(fd, data, len);
data/ipmiutil-3.1.7/util/ipmilan.c:1718:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(node) > SZGNODE) {
data/ipmiutil-3.1.7/util/ipmilan.c:1719:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	       strncpy(nodename, node, SZGNODE); nodename[SZGNODE] = 0;
data/ipmiutil-3.1.7/util/ipmilan.c:1753:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(_dest_ip, temp, INET_ADDRSTRLEN);
data/ipmiutil-3.1.7/util/ipmilanplus.c:312:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              n = strlen(pswd);
data/ipmiutil-3.1.7/util/ipmilanplus.c:315:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
              strncpy(intf->session->authcode, pswd, n);
data/ipmiutil-3.1.7/util/ipmilanplus.c:477:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strncmp("intelplus", oemtype, strlen(oemtype)) == 0) {
data/ipmiutil-3.1.7/util/ipmilanplus.c:495:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
             if (strncmp(oem_list[i].name,oemtype,strlen(oemtype)) == 0)
data/ipmiutil-3.1.7/util/ireset.c:239:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = (int)strlen(istr);
data/ipmiutil-3.1.7/util/ireset.c:250:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy((char *)&idata[5],&istr[n],13);
data/ipmiutil-3.1.7/util/ireset.c:253:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	  strncpy((char *)&idata[2],&istr[n],16);
data/ipmiutil-3.1.7/util/ireset.c:548:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          case 'i': if (strlen(optarg) < MAX_INIT) initstr = optarg; break; 
data/ipmiutil-3.1.7/util/isel.c:764:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	  if (strlen(ipath)+8 < sizeof(idxfile)) {
data/ipmiutil-3.1.7/util/isel.c:790:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(idxfile,"-");
data/ipmiutil-3.1.7/util/isel.c:792:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(idxfile2,"-");
data/ipmiutil-3.1.7/util/isel.c:803:12:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
           strcat(idxfile,"-");
data/ipmiutil-3.1.7/util/isel.c:805:12:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
           strcat(idxfile2,"-");
data/ipmiutil-3.1.7/util/isensor.c:2573:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(stype_str,tmpstr,n);
data/ipmiutil-3.1.7/util/isensor.c:2679:18:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	   if (fsimple) strncpy(rdgstr,oem_string,sizeof(rdgstr));
data/ipmiutil-3.1.7/util/iserial.c:747:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   len = (int)strlen(str);
data/ipmiutil-3.1.7/util/iserial.c:751:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       n = (int)strlen(mapbaud[i].str);
data/ipmiutil-3.1.7/util/iserial.c:886:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		    strncpy(rguser,optarg,16);
data/ipmiutil-3.1.7/util/iserial.c:892:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		    strncpy(rgpasswd,optarg,PSW_LEN);
data/ipmiutil-3.1.7/util/iserial.c:896:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    memset(optarg, ' ', strlen(optarg));
data/ipmiutil-3.1.7/util/iserial.c:1438:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   memcpy(&SerRecord.data[1],rguser,strlen(rguser));
data/ipmiutil-3.1.7/util/iserial.c:1445:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   memcpy(&SerRecord.data[2],rgpasswd,strlen(rgpasswd));
data/ipmiutil-3.1.7/util/iserial.c:1460:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	   memcpy(&SerRecord.data[2],rgpasswd,strlen(rgpasswd));
data/ipmiutil-3.1.7/util/iserial.c:1491:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	     memcpy(&SerRecord.data[2],rgpasswd,strlen(rgpasswd));
data/ipmiutil-3.1.7/util/isol.c:239:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    len = read(fd, buf, sz);
data/ipmiutil-3.1.7/util/isol.c:325:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l = (int)strlen(pattn);
data/ipmiutil-3.1.7/util/isol.c:338:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(pattn);
data/ipmiutil-3.1.7/util/isol.c:344:15:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    if (fadd) strcat(logtmp,"\n");
data/ipmiutil-3.1.7/util/isol.c:1051:23:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                  c = fgetc(fp_scr);
data/ipmiutil-3.1.7/util/isol.c:1167:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          case 'i': strncpy(file_scr,optarg,sizeof(file_scr)); 
data/ipmiutil-3.1.7/util/isol.c:1174:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          case 'o': strncpy(file_trc,optarg,sizeof(file_trc));
data/ipmiutil-3.1.7/util/isol.c:1181:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
          case 'v': strncpy(dbglog_name,optarg,sizeof(dbglog_name));
data/ipmiutil-3.1.7/util/itsol.c:485:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strlen(argv[i]) == 2 && strncmp(argv[i], "ro", 2) == 0)
data/ipmiutil-3.1.7/util/itsol.c:487:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strlen(argv[i]) == 2 && strncmp(argv[i], "rw", 2) == 0)
data/ipmiutil-3.1.7/util/itsol.c:489:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strlen(argv[i]) == 7 && strncmp(argv[i], "altterm", 7) == 0)
data/ipmiutil-3.1.7/util/itsol.c:491:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		else if (strlen(argv[i]) == 4 && strncmp(argv[i], "help", 4) == 0) {
data/ipmiutil-3.1.7/util/itsol.c:625:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			result = read(fileno(stdin), in_buff + in_buff_fill,
data/ipmiutil-3.1.7/util/oem_dell.c:2084:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ( tmp-str != strlen(str) )
data/ipmiutil-3.1.7/util/oem_dell.c:5452:33:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
         if (reading[2] & 0x01) strncpy(pstring,"OK",slen); 
data/ipmiutil-3.1.7/util/oem_dell.c:5453:20:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
         else      strncpy(pstring,"Exceeded",slen); /*LimitExceeded*/
data/ipmiutil-3.1.7/util/oem_dell.c:5580:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
												str = desc+strlen(desc);
data/ipmiutil-3.1.7/util/oem_dell.c:5690:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						str = desc+strlen(desc);
data/ipmiutil-3.1.7/util/oem_dell.c:5722:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						str = desc+strlen(desc);
data/ipmiutil-3.1.7/util/oem_dell.h:278:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                        uint16_t read;  /* discrete reading mask */
data/ipmiutil-3.1.7/util/oem_hp.c:96:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(pstring,"na",slen);    /*oem*/
data/ipmiutil-3.1.7/util/oem_hp.c:105:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	   strncpy(pstring,"Init",slen); 
data/ipmiutil-3.1.7/util/oem_intel.c:580:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(pstring, mystr, slen);
data/ipmiutil-3.1.7/util/oem_intel.c:581:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((int)strlen(mystr) > slen) pstring[slen-1] = 0; /*string*/
data/ipmiutil-3.1.7/util/oem_intel.c:596:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(pstring, mystr, slen);
data/ipmiutil-3.1.7/util/oem_intel.c:597:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((int)strlen(mystr) > slen) pstring[slen-1] = 0; /*string*/
data/ipmiutil-3.1.7/util/oem_intel.c:1113:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(desc, pstr, n+1);
data/ipmiutil-3.1.7/util/oem_intel.c:1156:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	   strncpy(pstring, pstr, slen);
data/ipmiutil-3.1.7/util/oem_intel.c:1575:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(outbuf, poststr, szbuf);
data/ipmiutil-3.1.7/util/oem_kontron.c:223:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(str, buf2str(&data[off], len), len*2);
data/ipmiutil-3.1.7/util/oem_kontron.c:610:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(fru_area) != sn_size)
data/ipmiutil-3.1.7/util/oem_kontron.c:684:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if(strlen(fru_area) != sn_size)
data/ipmiutil-3.1.7/util/oem_kontron.c:1109:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   if (rv == 0) strncpy(pstring, pstr, slen);
data/ipmiutil-3.1.7/util/oem_sun.c:988:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   if (rv == 0) strncpy(pstring, pstr, slen);
data/ipmiutil-3.1.7/util/oem_supermicro.c:299:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(pstr, str, sz);
data/ipmiutil-3.1.7/util/oem_supermicro.c:517:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
   if (rv == 0) strncpy(pstring, pstr, slen);
data/ipmiutil-3.1.7/util/subs.c:81:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   return((int)strlen(s));
data/ipmiutil-3.1.7/util/subs.c:323:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	 strncpy(log_name, mname, len);
data/ipmiutil-3.1.7/util/subs.c:594:7:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
      usleep(u);

ANALYSIS SUMMARY:

Hits = 1857
Lines analyzed = 101146 in approximately 3.40 seconds (29781 lines/second)
Physical Source Lines of Code (SLOC) = 75554
Hits@level = [0] 4242 [1] 201 [2] 1285 [3]  48 [4] 323 [5]   0
Hits@level+ = [0+] 6099 [1+] 1857 [2+] 1656 [3+] 371 [4+] 323 [5+]   0
Hits/KSLOC@level+ = [0+] 80.7237 [1+] 24.5784 [2+] 21.9181 [3+] 4.9104 [4+] 4.27509 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.