Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_load.c Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest.c Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_copy.c Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest2.c Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/midl.h Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/midl.c Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_dump.c Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/lmdb.h Examining data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_stat.c Examining data/openldap-2.4.56+dfsg/libraries/liblber/decode.c Examining data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c Examining data/openldap-2.4.56+dfsg/libraries/liblber/io.c Examining data/openldap-2.4.56+dfsg/libraries/liblber/options.c Examining data/openldap-2.4.56+dfsg/libraries/liblber/lber-int.h Examining data/openldap-2.4.56+dfsg/libraries/liblber/idtest.c Examining data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c Examining data/openldap-2.4.56+dfsg/libraries/liblber/encode.c Examining data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c Examining data/openldap-2.4.56+dfsg/libraries/liblber/memory.c Examining data/openldap-2.4.56+dfsg/libraries/liblber/assert.c Examining data/openldap-2.4.56+dfsg/libraries/liblber/nt_err.c Examining data/openldap-2.4.56+dfsg/libraries/liblber/debug.c Examining data/openldap-2.4.56+dfsg/libraries/liblber/etest.c Examining data/openldap-2.4.56+dfsg/libraries/liblber/dtest.c Examining data/openldap-2.4.56+dfsg/libraries/librewrite/map.c Examining data/openldap-2.4.56+dfsg/libraries/librewrite/subst.c Examining data/openldap-2.4.56+dfsg/libraries/librewrite/params.c Examining data/openldap-2.4.56+dfsg/libraries/librewrite/rule.c Examining data/openldap-2.4.56+dfsg/libraries/librewrite/session.c Examining data/openldap-2.4.56+dfsg/libraries/librewrite/parse.c Examining data/openldap-2.4.56+dfsg/libraries/librewrite/rewrite-map.h Examining data/openldap-2.4.56+dfsg/libraries/librewrite/info.c Examining data/openldap-2.4.56+dfsg/libraries/librewrite/context.c Examining data/openldap-2.4.56+dfsg/libraries/librewrite/config.c Examining data/openldap-2.4.56+dfsg/libraries/librewrite/ldapmap.c Examining data/openldap-2.4.56+dfsg/libraries/librewrite/var.c Examining data/openldap-2.4.56+dfsg/libraries/librewrite/rewrite-int.h Examining data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c Examining data/openldap-2.4.56+dfsg/libraries/librewrite/rewrite.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/sockpair.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/signal.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/testtavl.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/getpeereid.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/meter.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/hash.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/setproctitle.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/entropy.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/getopt.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/getpass.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/slapdmsg.h Examining data/openldap-2.4.56+dfsg/libraries/liblutil/passfile.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/detach.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/md5.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/ptest.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/memcmp.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/lockf.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/base64.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/tavl.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/sasl.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/avl.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/testavl.c Examining data/openldap-2.4.56+dfsg/libraries/liblutil/sha1.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/free.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/utf-8-conv.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/getattr.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/modify.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/unbind.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/urltest.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/tls_o.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/schema.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/getentry.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/options.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/ldap-int.h Examining data/openldap-2.4.56+dfsg/libraries/libldap/url.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/addentry.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/modrdn.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/stctrl.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/ldap_sync.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/turn.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/references.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/assertion.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/open.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/abandon.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/add.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/sbind.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/ftest.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/sort.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/getdn.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/passwd.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/filter.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/getvalues.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/dntest.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/os-local.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/vlvctrl.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/sortctrl.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/init.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/deref.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/ldap-tls.h Examining data/openldap-2.4.56+dfsg/libraries/libldap/test.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/result.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/extended.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/request.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/controls.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/pagectrl.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/bind.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/charray.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/t61.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/sasl.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/txn.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/compare.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/messages.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/cancel.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/tls2.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/print.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/error.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/utf-8.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/search.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/apitest.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/dds.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/string.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/fetch.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/ppolicy.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/whoami.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/delete.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/ntlm.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c Examining data/openldap-2.4.56+dfsg/libraries/libldap/tls_g.c Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/rdwr.c Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_cthreads.c Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/rq.c Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/ldap_thr_debug.h Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_posix.c Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/tpool.c Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_nt.c Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_thr.c Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_stub.c Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/rmutex.c Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_pth.c Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c Examining data/openldap-2.4.56+dfsg/libraries/libldap_r/threads.c Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucpgba.h Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/uctable.h Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucpgba.c Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucdata.c Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucdata.h Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/utbm/utbmstub.c Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/utbm/utbm.c Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/utbm/utbm.h Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ure/ure.c Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ure/urestubs.c Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ure/ure.h Examining data/openldap-2.4.56+dfsg/libraries/liblunicode/ucstr.c Examining data/openldap-2.4.56+dfsg/build/version.h Examining data/openldap-2.4.56+dfsg/servers/slapd/str2filter.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/plugin.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_pblock.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_ops.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/printmsg.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_ext.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi.h Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/proto-slapi.h Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_overlay.c Examining data/openldap-2.4.56+dfsg/servers/slapd/ava.c Examining data/openldap-2.4.56+dfsg/servers/slapd/modify.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slaptest.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapadd.c Examining data/openldap-2.4.56+dfsg/servers/slapd/unbind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/config.h Examining data/openldap-2.4.56+dfsg/servers/slapd/user.c Examining data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/modify.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/unbind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/back-sock.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/modrdn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/proto-sock.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/add.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/init.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/opensock.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/config.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/result.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/extended.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/bind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/compare.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/search.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sock/delete.c Examining data/openldap-2.4.56+dfsg/servers/slapd/schema.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/modify.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/log.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/proto-back-monitor.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/rww.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/conn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/back-monitor.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/overlay.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/database.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/thread.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/backend.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/listener.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/operation.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/cache.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/entry.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/sent.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/bind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/compare.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/operational.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/search.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/time.c Examining data/openldap-2.4.56+dfsg/servers/slapd/cr.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapcat.c Examining data/openldap-2.4.56+dfsg/servers/slapd/modrdn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/mods.c Examining data/openldap-2.4.56+dfsg/servers/slapd/ad.c Examining data/openldap-2.4.56+dfsg/servers/slapd/sets.h Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmconf.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.h Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/retcode.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/seqmod.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/translucent.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmdn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/dyngroup.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/constraint.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/deref.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/valsort.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/memberof.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/refint.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/overlays.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/auditlog.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmmap.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/collect.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/unique.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/sssvlv.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c Examining data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c Examining data/openldap-2.4.56+dfsg/servers/slapd/syntax.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapschema.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapauth.c Examining data/openldap-2.4.56+dfsg/servers/slapd/mra.c Examining data/openldap-2.4.56+dfsg/servers/slapd/ldapsync.c Examining data/openldap-2.4.56+dfsg/servers/slapd/abandon.c Examining data/openldap-2.4.56+dfsg/servers/slapd/starttls.c Examining data/openldap-2.4.56+dfsg/servers/slapd/add.c Examining data/openldap-2.4.56+dfsg/servers/slapd/root_dse.c Examining data/openldap-2.4.56+dfsg/servers/slapd/acl.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/back-ndb.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/init.cpp Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/proto-ndb.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/delete.cpp Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/modify.cpp Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/modrdn.cpp Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/add.cpp Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/bind.cpp Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/compare.cpp Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/config.cpp Examining data/openldap-2.4.56+dfsg/servers/slapd/back-relay/back-relay.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-relay/op.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-relay/proto-back-relay.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-relay/init.c Examining data/openldap-2.4.56+dfsg/servers/slapd/alock.h Examining data/openldap-2.4.56+dfsg/servers/slapd/backend.c Examining data/openldap-2.4.56+dfsg/servers/slapd/schema_prep.c Examining data/openldap-2.4.56+dfsg/servers/slapd/index.c Examining data/openldap-2.4.56+dfsg/servers/slapd/alock.c Examining data/openldap-2.4.56+dfsg/servers/slapd/lock.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/modify.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/id2entry.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/tools.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/modrdn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/back-bdb.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/key.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/add.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/nextid.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/index.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/proto-bdb.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/trans.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/filterindex.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/idl.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/cache.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/extended.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/referral.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dbcache.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/idl.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/bind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2entry.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/attr.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/compare.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/operational.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/error.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/search.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/delete.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c Examining data/openldap-2.4.56+dfsg/servers/slapd/zn_malloc.c Examining data/openldap-2.4.56+dfsg/servers/slapd/operation.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/modify.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/proto-ldap.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/unbind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/modrdn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/add.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/pbind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/init.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/chain.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/extended.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/bind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/compare.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/distproc.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/back-ldap.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/search.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/delete.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/dncache.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/map.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/modify.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/unbind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/suffixmassage.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/modrdn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/proto-meta.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/add.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/candidates.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/init.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/bind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/compare.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/back-meta.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-meta/delete.c Examining data/openldap-2.4.56+dfsg/servers/slapd/globals.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c Examining data/openldap-2.4.56+dfsg/servers/slapd/mr.c Examining data/openldap-2.4.56+dfsg/servers/slapd/dn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/passwd.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/back-passwd.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/proto-passwd.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/init.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/config.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/modify.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/id2entry.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/tools.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/modrdn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/back-mdb.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/key.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/add.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/nextid.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/index.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/filterindex.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/init.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/config.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/extended.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/referral.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/bind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2entry.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/attr.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/compare.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/proto-mdb.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/operational.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/delete.c Examining data/openldap-2.4.56+dfsg/servers/slapd/sl_malloc.c Examining data/openldap-2.4.56+dfsg/servers/slapd/filter.c Examining data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c Examining data/openldap-2.4.56+dfsg/servers/slapd/at.c Examining data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c Examining data/openldap-2.4.56+dfsg/servers/slapd/ctxcsn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c Examining data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c Examining data/openldap-2.4.56+dfsg/servers/slapd/backover.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-null/null.c Examining data/openldap-2.4.56+dfsg/servers/slapd/component.h Examining data/openldap-2.4.56+dfsg/servers/slapd/value.c Examining data/openldap-2.4.56+dfsg/servers/slapd/init.c Examining data/openldap-2.4.56+dfsg/servers/slapd/connection.c Examining data/openldap-2.4.56+dfsg/servers/slapd/ch_malloc.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapdn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/filterentry.c Examining data/openldap-2.4.56+dfsg/servers/slapd/config.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/modify.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/unbind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/modrdn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/fork.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/add.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/init.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/config.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/result.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/proto-shell.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/bind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/shell.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/compare.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/search.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-shell/delete.c Examining data/openldap-2.4.56+dfsg/servers/slapd/matchedValues.c Examining data/openldap-2.4.56+dfsg/servers/slapd/entry.c Examining data/openldap-2.4.56+dfsg/servers/slapd/schema_check.c Examining data/openldap-2.4.56+dfsg/servers/slapd/component.c Examining data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.h Examining data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/passwd-shell.c Examining data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.c Examining data/openldap-2.4.56+dfsg/servers/slapd/result.c Examining data/openldap-2.4.56+dfsg/servers/slapd/frontend.c Examining data/openldap-2.4.56+dfsg/servers/slapd/aci.c Examining data/openldap-2.4.56+dfsg/servers/slapd/nt_svc.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-hdb/back-bdb.h Examining data/openldap-2.4.56+dfsg/servers/slapd/slappasswd.c Examining data/openldap-2.4.56+dfsg/servers/slapd/oc.c Examining data/openldap-2.4.56+dfsg/servers/slapd/limits.c Examining data/openldap-2.4.56+dfsg/servers/slapd/oidm.c Examining data/openldap-2.4.56+dfsg/servers/slapd/extended.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/modify.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/modrdn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/rdbms_depend/timesten/dnreverse/dnreverse.cpp Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/proto-sql.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/sql-wrap.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/back-sql.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/entry-id.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/init.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/config.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/bind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/compare.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/api.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/operational.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/search.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-sql/delete.c Examining data/openldap-2.4.56+dfsg/servers/slapd/controls.c Examining data/openldap-2.4.56+dfsg/servers/slapd/sets.c Examining data/openldap-2.4.56+dfsg/servers/slapd/referral.c Examining data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/init.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/config.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/proto-dnssrv.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/referral.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/bind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/compare.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/search.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/modify.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/proto-perl.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/modrdn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/perl_back.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/add.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/asperl_undefs.h Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/init.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/config.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/bind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/compare.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/close.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/search.c Examining data/openldap-2.4.56+dfsg/servers/slapd/back-perl/delete.c Examining data/openldap-2.4.56+dfsg/servers/slapd/bind.c Examining data/openldap-2.4.56+dfsg/servers/slapd/attr.c Examining data/openldap-2.4.56+dfsg/servers/slapd/daemon.c Examining data/openldap-2.4.56+dfsg/servers/slapd/txn.c Examining data/openldap-2.4.56+dfsg/servers/slapd/compare.c Examining data/openldap-2.4.56+dfsg/servers/slapd/cancel.c Examining data/openldap-2.4.56+dfsg/servers/slapd/main.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.h Examining data/openldap-2.4.56+dfsg/servers/slapd/slapacl.c Examining data/openldap-2.4.56+dfsg/servers/slapd/operational.c Examining data/openldap-2.4.56+dfsg/servers/slapd/backglue.c Examining data/openldap-2.4.56+dfsg/servers/slapd/phonetic.c Examining data/openldap-2.4.56+dfsg/servers/slapd/schemaparse.c Examining data/openldap-2.4.56+dfsg/servers/slapd/search.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slap.h Examining data/openldap-2.4.56+dfsg/servers/slapd/delete.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.c Examining data/openldap-2.4.56+dfsg/servers/slapd/slapindex.c Examining data/openldap-2.4.56+dfsg/servers/slapd/sasl.c Examining data/openldap-2.4.56+dfsg/servers/slapd/module.c Examining data/openldap-2.4.56+dfsg/doc/devel/template.c Examining data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c Examining data/openldap-2.4.56+dfsg/contrib/ldaptcl/tkAppInit.c Examining data/openldap-2.4.56+dfsg/contrib/ldaptcl/tclAppInit.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/allop/allop.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/denyop/denyop.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nops/nops.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/acl/gssacl.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/acl/posixgroup.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastbind/lastbind.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/noopsrch/noopsrch.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/addpartial/addpartial-overlay.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/trace/trace.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastmod/lastmod.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.h Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/argon2/pw-argon2.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/radius.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/netscape.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/kerberos.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/apr1.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/samba4/vernum.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/samba4/rdnval.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/samba4/pguid.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/cloak/cloak.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/kinit/kinit.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/autogroup/autogroup.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/proxyOld/proxyOld.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/dupent/dupent.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/asn_to_syn_mr.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/asn.h Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/smbk5pwd/smbk5pwd.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.h Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/netgroup.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/ether.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/shadow.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/host.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/passwd.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/nslcd-prot.h Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/nslcd.h Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/attrs.h Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.h Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/group.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/service.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/rpc.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/protocol.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/network.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/alias.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c Examining data/openldap-2.4.56+dfsg/contrib/slapd-modules/allowed/allowed.c Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/examples/main.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/examples/startTls.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/examples/urlTest.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/examples/readSchema.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPConstraints.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/SaslInteraction.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPBindRequest.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPUrlList.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSaslBindResult.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/SaslInteractionHandler.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAttrType.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModification.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPRequest.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchRequest.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPEntry.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPCompareRequest.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPDeleteRequest.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPRequest.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPReferenceList.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPEntryList.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPMessage.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAsynConnection.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModList.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModifyRequest.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LdifReader.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPDeleteRequest.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchResult.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPRebindAuth.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModDNRequest.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPBindRequest.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAttribute.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPExtRequest.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPRebind.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPUrl.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPUrlList.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPObjClass.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/StringList.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LdifReader.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAttributeList.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPRebind.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPControlSet.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPMessageQueue.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAsynConnection.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPException.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/ac/time.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LdifWriter.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/StringList.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPCompareRequest.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAttributeList.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSchema.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPControlSet.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPControl.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPExtRequest.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPResult.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPExtResult.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchResult.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchResults.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSchema.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPControl.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/TlsOptions.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchReference.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchRequest.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPEntryList.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPObjClass.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPReferenceList.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/TlsOptions.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/SaslInteractionHandler.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPConnection.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LdifWriter.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchResults.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAddRequest.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModifyRequest.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPMessageQueue.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSaslBindResult.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModification.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPUrl.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPException.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModList.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPSearchReference.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPConnection.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPResult.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPModDNRequest.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/debug.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAttribute.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAddRequest.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPMessage.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPRebindAuth.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPConstraints.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPEntry.h Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/SaslInteraction.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPAttrType.cpp Examining data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LDAPExtResult.cpp Examining data/openldap-2.4.56+dfsg/contrib/slapi-plugins/addrdnvalues/addrdnvalues.c Examining data/openldap-2.4.56+dfsg/clients/tools/ldapmodrdn.c Examining data/openldap-2.4.56+dfsg/clients/tools/common.c Examining data/openldap-2.4.56+dfsg/clients/tools/common.h Examining data/openldap-2.4.56+dfsg/clients/tools/ldapcompare.c Examining data/openldap-2.4.56+dfsg/clients/tools/ldapwhoami.c Examining data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c Examining data/openldap-2.4.56+dfsg/clients/tools/ldapurl.c Examining data/openldap-2.4.56+dfsg/clients/tools/ldapmodify.c Examining data/openldap-2.4.56+dfsg/clients/tools/ldappasswd.c Examining data/openldap-2.4.56+dfsg/clients/tools/ldapdelete.c Examining data/openldap-2.4.56+dfsg/clients/tools/ldapexop.c Examining data/openldap-2.4.56+dfsg/include/openldap.h Examining data/openldap-2.4.56+dfsg/include/lber.h Examining data/openldap-2.4.56+dfsg/include/sysexits-compat.h Examining data/openldap-2.4.56+dfsg/include/ldif.h Examining data/openldap-2.4.56+dfsg/include/avl.h Examining data/openldap-2.4.56+dfsg/include/ldap_int_thread.h Examining data/openldap-2.4.56+dfsg/include/ldap_pvt_uc.h Examining data/openldap-2.4.56+dfsg/include/getopt-compat.h Examining data/openldap-2.4.56+dfsg/include/ldap_queue.h Examining data/openldap-2.4.56+dfsg/include/lutil_meter.h Examining data/openldap-2.4.56+dfsg/include/lutil_hash.h Examining data/openldap-2.4.56+dfsg/include/ldap_cdefs.h Examining data/openldap-2.4.56+dfsg/include/ldap_pvt_thread.h Examining data/openldap-2.4.56+dfsg/include/ac/socket.h Examining data/openldap-2.4.56+dfsg/include/ac/termios.h Examining data/openldap-2.4.56+dfsg/include/ac/stdarg.h Examining data/openldap-2.4.56+dfsg/include/ac/fdset.h Examining data/openldap-2.4.56+dfsg/include/ac/unistd.h Examining data/openldap-2.4.56+dfsg/include/ac/errno.h Examining data/openldap-2.4.56+dfsg/include/ac/signal.h Examining data/openldap-2.4.56+dfsg/include/ac/bytes.h Examining data/openldap-2.4.56+dfsg/include/ac/param.h Examining data/openldap-2.4.56+dfsg/include/ac/dirent.h Examining data/openldap-2.4.56+dfsg/include/ac/wait.h Examining data/openldap-2.4.56+dfsg/include/ac/setproctitle.h Examining data/openldap-2.4.56+dfsg/include/ac/localize.h Examining data/openldap-2.4.56+dfsg/include/ac/stdlib.h Examining data/openldap-2.4.56+dfsg/include/ac/time.h Examining data/openldap-2.4.56+dfsg/include/ac/syslog.h Examining data/openldap-2.4.56+dfsg/include/ac/alloca.h Examining data/openldap-2.4.56+dfsg/include/ac/string.h Examining data/openldap-2.4.56+dfsg/include/ac/ctype.h Examining data/openldap-2.4.56+dfsg/include/ac/regex.h Examining data/openldap-2.4.56+dfsg/include/ac/crypt.h Examining data/openldap-2.4.56+dfsg/include/ac/assert.h Examining data/openldap-2.4.56+dfsg/include/ac/sysexits.h Examining data/openldap-2.4.56+dfsg/include/ldap_utf8.h Examining data/openldap-2.4.56+dfsg/include/lutil_md5.h Examining data/openldap-2.4.56+dfsg/include/rewrite.h Examining data/openldap-2.4.56+dfsg/include/ldap_pvt.h Examining data/openldap-2.4.56+dfsg/include/slapi-plugin.h Examining data/openldap-2.4.56+dfsg/include/lutil_ldap.h Examining data/openldap-2.4.56+dfsg/include/ldap_log.h Examining data/openldap-2.4.56+dfsg/include/ldap_schema.h Examining data/openldap-2.4.56+dfsg/include/lutil.h Examining data/openldap-2.4.56+dfsg/include/lutil_lockf.h Examining data/openldap-2.4.56+dfsg/include/lber_pvt.h Examining data/openldap-2.4.56+dfsg/include/ldap_rq.h Examining data/openldap-2.4.56+dfsg/include/lutil_sha1.h Examining data/openldap-2.4.56+dfsg/include/ldap.h Examining data/openldap-2.4.56+dfsg/include/ldap_defaults.h Examining data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-addel.c Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-common.h Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-modrdn.c Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-common.c Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-bind.c Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-search.c Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-modify.c Examining data/openldap-2.4.56+dfsg/tests/progs/slapd-read.c FINAL RESULTS: data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:918:7: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(NSLCD_SOCKET,(mode_t)0666)) data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4830:4: [5] (misc) SetSecurityDescriptorDacl: Never create NULL ACLs; an attacker can set it to Everyone (Deny All Access), which would even forbid administrator access (CWE-732). SetSecurityDescriptorDacl(&mdb_null_sd, TRUE, 0, FALSE); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4830:4: [5] (misc) SetSecurityDescriptorDacl: Never create NULL ACLs; an attacker can set it to Everyone (Deny All Access), which would even forbid administrator access (CWE-732). SetSecurityDescriptorDacl(&mdb_null_sd, TRUE, 0, FALSE); data/openldap-2.4.56+dfsg/clients/tools/common.c:1565:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( msgbuf+2, ldap_passwordpolicy_err2txt( pErr )); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:812:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( def_urlpre, "file:///%s/", data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:882:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( urlpre, "file:///%s/", data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1391:12: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. outlen = snprintf( filter, max_fsize, filtpatt, value ); data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:317:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(filter, filtpatt, value); data/openldap-2.4.56+dfsg/contrib/slapd-modules/autogroup/autogroup.c:1783:12: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. ptr += snprintf( c->cr_msg, sizeof( c->cr_msg ), data/openldap-2.4.56+dfsg/contrib/slapd-modules/cloak/cloak.c:63:12: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = snprintf( c->cr_msg, data/openldap-2.4.56+dfsg/contrib/slapd-modules/cloak/cloak.c:69:12: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = snprintf( c->cr_msg, data/openldap-2.4.56+dfsg/contrib/slapd-modules/cloak/cloak.c:126:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, data/openldap-2.4.56+dfsg/contrib/slapd-modules/cloak/cloak.c:139:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, sizeof( c->cr_msg ), CLOAK_USAGE data/openldap-2.4.56+dfsg/contrib/slapd-modules/cloak/cloak.c:151:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, sizeof( c->cr_msg ), data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c:382:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( line + lcur, buf ); \ data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:614:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ssd.bv_val, "%s ldap:///%s??%s?%s", nss_svcs[i].word.bv_val, data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:634:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(map.bv_val, "%s %s %s", nss_svcs[i].word.bv_val, data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:85:23: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. pi->msg.bv_len = sprintf(pi->msg.bv_val, data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:131:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(sdn.bv_val, "cn=%s+uid=%s,cn=%s,cn=pam,cn=auth", data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:648:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(bv[0].bv_val, "%s %s %s %s (%s@%s)", data/openldap-2.4.56+dfsg/include/ac/crypt.h:26:16: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. extern char *(crypt)(); data/openldap-2.4.56+dfsg/include/ac/setproctitle.h:27:24: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. LDAP_GCCATTR((format(printf, 1, 2))); data/openldap-2.4.56+dfsg/include/ac/unistd.h:39:56: [4] (misc) getpass: This function is obsolete and not portable. It was in SUSv2 but removed by POSIX.2. What it does exactly varies considerably between systems, particularly in where its prompt is displayed and where it gets its data (e.g., /dev/tty, stdin, stderr, etc.). In addition, some implementations overflow buffers. (CWE-676, CWE-120, CWE-20). Make the specific calls to do exactly what you want. If you continue to use it, or write your own, be sure to zero the password as soon as possible to avoid leaving the cleartext password visible in the process' address space. LDAP_LUTIL_F(char*)(lutil_getpass) LDAP_P((const char *getpass)); data/openldap-2.4.56+dfsg/include/lber_pvt.h:61:30: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. ... )) LDAP_GCCATTR((format(printf, 3, 4))); data/openldap-2.4.56+dfsg/include/ldap_log.h:143:9: [4] (format) syslog: If syslog's format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant format string for syslog. #define syslog eb_syslog data/openldap-2.4.56+dfsg/include/ldap_log.h:156:4: [4] (format) syslog: If syslog's format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant format string for syslog. syslog( LDAP_LEVEL_MASK((severity)), (fmt) ); \ data/openldap-2.4.56+dfsg/include/ldap_log.h:163:4: [4] (format) syslog: If syslog's format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant format string for syslog. syslog( LDAP_LEVEL_MASK((severity)), (fmt), (arg1) ); \ data/openldap-2.4.56+dfsg/include/ldap_log.h:170:4: [4] (format) syslog: If syslog's format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant format string for syslog. syslog( LDAP_LEVEL_MASK((severity)), (fmt), (arg1), (arg2) ); \ data/openldap-2.4.56+dfsg/include/ldap_log.h:177:4: [4] (format) syslog: If syslog's format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant format string for syslog. syslog( LDAP_LEVEL_MASK((severity)), (fmt), (arg1), (arg2), (arg3) ); \ data/openldap-2.4.56+dfsg/include/ldap_log.h:184:4: [4] (format) syslog: If syslog's format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant format string for syslog. syslog( LDAP_LEVEL_MASK((severity)), (fmt), (arg1), (arg2), (arg3), (arg4) ); \ data/openldap-2.4.56+dfsg/include/ldap_log.h:191:4: [4] (format) syslog: If syslog's format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant format string for syslog. syslog( LDAP_LEVEL_MASK((severity)), (fmt), (arg1), (arg2), (arg3), (arg4), (arg5) ); \ data/openldap-2.4.56+dfsg/include/ldap_log.h:250:47: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. const char* fmt, ... )) LDAP_GCCATTR((format(printf, 3, 4))); data/openldap-2.4.56+dfsg/include/slapi-plugin.h:90:97: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. int slapi_access_allowed( Slapi_PBlock *pb, Slapi_Entry *e, char *attr, struct berval *val, int access ); data/openldap-2.4.56+dfsg/include/slapi-plugin.h:427:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. int access, data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c:113:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf( buf, sizeof(buf)-1, fmt, vl ); data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c:137:2: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf( buf, sizeof(buf)-1, fmt, ap ); data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:74:8: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = vsnprintf( buffer+off, sizeof(buffer)-off, fmt, vl ); data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:88:8: [4] (format) syslog: If syslog's format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant format string for syslog. #undef syslog data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:95:2: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf( buffer, sizeof(buffer), fmt, vl ); data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c:802:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( (char *)sbiod->sbiod_pvt, (char *)arg ); data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:65:8: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. res = vfprintf( f, fmt, ap ); data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:70:9: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. res = vsprintf( str, fmt, ap ); data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:83:8: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. res = vsnprintf( str, n, fmt, ap ); data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:178:12: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. s2 += sprintf(s2, fm2, ss); data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:181:11: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. s2 += sprintf(s2, fm2, va_arg(ap, int)); data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:202:9: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. return vsnprintf( str, 0, fmt, ap ); data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:215:2: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf( buf, sizeof(buf), fmt, ap ); data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c:792:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ptr += sprintf(ptr, "%s%d", sprops[i].key.bv_val, v ); data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c:797:12: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ptr += sprintf(ptr, "%s", sprops[i].key.bv_val ); data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c:802:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ptr += sprintf(ptr, "%s", sprops[i].key.bv_val ); data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:168:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dn + loc, s); data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:280:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(request, "_ldap._tcp.%s", domain); data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:402:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. cur += sprintf(&hostlist[cur], "%s:%hu", hostent_head[i].hostname, hostent_head[i].port); data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:560:8: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. ret = snprintf( svc_principal, svc_principal_size, principal_fmt, str ); data/openldap-2.4.56+dfsg/libraries/libldap/init.c:346:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "%s" LDAP_DIRSEP "%s", home, file); data/openldap-2.4.56+dfsg/libraries/libldap/init.c:350:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(path, "%s" LDAP_DIRSEP ".%s", home, file); data/openldap-2.4.56+dfsg/libraries/libldap/init.c:381:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&buf[len], attrs[i].name); data/openldap-2.4.56+dfsg/libraries/libldap/ldap-int.h:648:103: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. LDAP_F (int) ldap_log_printf LDAP_P((LDAP *ld, int level, const char *fmt, ...)) LDAP_GCCATTR((format(printf, 3, 4))); data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:549:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*out, name); data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:939:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( *bufp + lcur, line ); data/openldap-2.4.56+dfsg/libraries/libldap/os-local.c:349:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( server.sun_path, path ); data/openldap-2.4.56+dfsg/libraries/libldap/print.c:56:2: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf( buf, sizeof(buf)-1, fmt, ap ); data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1507:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( *referralsp, LDAP_REF_STR ); data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1511:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( *referralsp, s ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:258:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( dn, dnsuffix ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:343:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf( stderr, usage, argv[ 0 ] ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:381:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( dn, dnsuffix ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:408:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( dn, dnsuffix ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:428:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( dn, dnsuffix ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:448:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( dn, dnsuffix ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:493:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( dn, dnsuffix ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:506:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( dn, dnsuffix ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:551:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( dn, dnsuffix ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:567:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( dn, dnsuffix ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:633:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( dnsuffix, line ); data/openldap-2.4.56+dfsg/libraries/libldap/url.c:649:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sofar = sprintf( s, "%s://%s%s%s:%d", u->lud_scheme, data/openldap-2.4.56+dfsg/libraries/libldap/url.c:657:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sofar = sprintf( s, "%s://", u->lud_scheme ); data/openldap-2.4.56+dfsg/libraries/libldap/url.c:716:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( &s[sofar], scope.bv_val ); data/openldap-2.4.56+dfsg/libraries/libldap/url.c:1443:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. p += sprintf(p, "[%s]", ludp->lud_host); data/openldap-2.4.56+dfsg/libraries/libldap/url.c:1445:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p, ludp->lud_host); data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:208:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf( stderr, data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:219:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf( stderr, data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:240:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. j += sprintf( errbuf + j, ", %d %s", data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4147:23: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. # define mdb_name_cpy wcscpy data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4152:23: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). # define mdb_name_cpy strcpy /**< Copy name (#mdb_nchar_t string) */ data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4191:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fname->mn_val, path); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4843:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(env->me_txns->mti_rmname, "Global\\MDBr%s", encbuf); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4844:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(env->me_txns->mti_wmname, "Global\\MDBw%s", encbuf); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4870:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(env->me_txns->mti_rmname, "/MDBr%s", encbuf); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4871:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(env->me_txns->mti_wmname, "/MDBw%s", encbuf); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:10121:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, txnid == (txnid_t)-1 ? data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_stat.c:196:7: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(span>1 ? " %9"Z"u[%"Z"d]\n" : " %9"Z"u\n", data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest.c:21:53: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \ data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest2.c:24:53: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \ data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:24:53: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \ data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:24:53: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \ data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:24:53: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \ data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:24:53: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define CHECK(test, msg) ((test) ? (void)0 : ((void)fprintf(stderr, \ data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1358:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _ucprop_size = %d;\n\n", NUMPROPS); data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1360:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint2 _ucprop_offsets[] = {"); data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1370:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _ucprop_ranges[] = {"); data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1420:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _uccase_size = %ld;\n\n", data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1423:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint2 _uccase_len[2] = {%ld, %ld};\n\n", data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1425:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _uccase_map[] = {"); data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1507:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _uccomp_size = %ld;\n\n", data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1510:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _uccomp_data[] = {"); data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1567:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _ucdcmp_size = %ld;\n\n", data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1570:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _ucdcmp_nodes[] = {"); data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1587:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _ucdcmp_decomp[] = {"); data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1659:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _uckdcmp_size = %ld;\n\n", data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1662:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _uckdcmp_nodes[] = {"); data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1679:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _uckdcmp_decomp[] = {"); data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1757:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _uccmcl_size = %ld;\n\n", (long) ccl_used); data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1759:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _uccmcl_nodes[] = {"); data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1816:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _ucnum_size = %lu;\n\n", data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1819:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "ac_uint4 _ucnum_nodes[] = {"); data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1834:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(out, PREF "short _ucnum_vals[] = {"); data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:171:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, TEXT("SYSTEM\\CurrentControlSet\\Services\\")); data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:172:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf, lpszServiceName); data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:904:13: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. char *cr = crypt( key, salt ); data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1218:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( entropy, (char *) salt ); data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1219:3: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( (char *) salt, sizeof(entropy), salt_format, entropy ); data/openldap-2.4.56+dfsg/libraries/liblutil/setproctitle.c:58:2: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf( buf, sizeof(buf)-1, fmt, ap ); data/openldap-2.4.56+dfsg/libraries/liblutil/setproctitle.c:74:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( s, buf ); data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:340:16: [4] (tmpfile) mktemp: Temporary file race condition (CWE-377). return open ( mktemp ( template ), O_RDWR|O_CREAT|O_EXCL, 0600 ); data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:404:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp, path); data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:422:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(d->data.d_name, data.cFileName); data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:434:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dir->data.d_name, data.cFileName); data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:962:8: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. ret = vsnprintf( buf, bufsize, fmt, ap ); data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:384:3: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( filter, sizeof( filter ), lud->lud_filter, data/openldap-2.4.56+dfsg/servers/slapd/acl.c:69:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access ); data/openldap-2.4.56+dfsg/servers/slapd/acl.c:111:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access, data/openldap-2.4.56+dfsg/servers/slapd/acl.c:140:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access, data/openldap-2.4.56+dfsg/servers/slapd/acl.c:164:28: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access_level = ACL_LEVEL( access ); data/openldap-2.4.56+dfsg/servers/slapd/acl.c:205:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access2str( access ), data/openldap-2.4.56+dfsg/servers/slapd/acl.c:224:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. state->as_access == access && data/openldap-2.4.56+dfsg/servers/slapd/acl.c:289:42: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. e, desc, val, &matches, count, state, access ); data/openldap-2.4.56+dfsg/servers/slapd/acl.c:312:25: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. ret = ACL_GRANT( mask, access ); data/openldap-2.4.56+dfsg/servers/slapd/acl.c:316:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access2str( access ), ret ? "granted" : "denied", data/openldap-2.4.56+dfsg/servers/slapd/acl.c:330:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access, data/openldap-2.4.56+dfsg/servers/slapd/acl.c:352:46: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. rc = slap_access_allowed( op, e, desc, val, access, state, maskp ); data/openldap-2.4.56+dfsg/servers/slapd/acl.c:364:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access, data/openldap-2.4.56+dfsg/servers/slapd/acl.c:381:28: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access_level = ACL_LEVEL( access ); data/openldap-2.4.56+dfsg/servers/slapd/acl.c:410:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. state->as_access == access && data/openldap-2.4.56+dfsg/servers/slapd/acl.c:427:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access2str( access ), e->e_dn, attr ); data/openldap-2.4.56+dfsg/servers/slapd/acl.c:451:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. desc, val, access, state, &mask ); data/openldap-2.4.56+dfsg/servers/slapd/acl.c:457:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. desc, val, access, state, &mask ); data/openldap-2.4.56+dfsg/servers/slapd/acl.c:477:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access2str( access ), ret ? "granted" : "denied", data/openldap-2.4.56+dfsg/servers/slapd/acl.c:482:22: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. state->as_access = access; data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1122:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access ) data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1131:41: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_mask_t a2pmask = ACL_ACCESS2PRIV( access ); data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2277:37: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Debug( LDAP_DEBUG_ANY, "%s%s%s\n", access, what, who ); data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2464:27: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access2str( slap_access_t access ) data/openldap-2.4.56+dfsg/servers/slapd/ad.c:399:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(d2->ad_cname.bv_val, d2->ad_type->sat_cname.bv_val); data/openldap-2.4.56+dfsg/servers/slapd/ad.c:434:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(lp, desc.ad_tags.bv_val); data/openldap-2.4.56+dfsg/servers/slapd/ad.c:1004:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( in, s ); data/openldap-2.4.56+dfsg/servers/slapd/at.c:1031:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( bva[i].bv_val, ibuf ); data/openldap-2.4.56+dfsg/servers/slapd/at.c:1032:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( bva[i].bv_val + idx.bv_len, bv.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:470:18: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. bv.bv_len = sprintf( bv.bv_val, "{%d}%s", i, data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:519:18: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. bv.bv_len = sprintf( buf, "%s %d", ps->bdp_name.bv_val, data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:932:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ps->bdp_name.bv_val, c->argv[1] ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dbcache.c:171:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( file, db->bdi_name.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dbcache.c:172:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( file+db->bdi_name.bv_len, BDB_SUFFIX ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/error.c:58:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( msg, db_strerror( rc ) ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c:250:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( path, bdb->bi_dbenv_home ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c:485:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( path, bdbi_databases[i].file ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c:780:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( v2, version ); data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/referral.c:100:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( &url.bv_val[STRLENOF( "ldap://" )], hosts[i] ); data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/search.c:109:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( &url.bv_val[STRLENOF( "ldap://" )], hosts[i] ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1006:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( bv2.bv_val, bv.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1008:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( &bv2.bv_val[bv.bv_len + 1], bc.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1083:15: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. int len = snprintf( buf, sizeof( buf ), SLAP_X_ORDERED_FMT, i ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:428:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( peername, "PATH=%s", sa.sa_un_addr.sun_path ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:444:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( peername, "IP=%s:%d", peeraddr, data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:451:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( peername, "IP=[%s]:%d", peeraddr, data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:465:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( peername, "IP=%s:%d", peeraddr, data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:470:10: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf( peername, SLAP_STRING_UNKNOWN ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:310:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( res->bv_val + i, LDIF ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:325:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( name + len, suffix ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:510:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(header, HEADER "# CRC32 %08x\n", crc32(spew, len)); data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:856:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( BVL_NAME( bvl ), dir->d_name ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:411:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ptr, matched->bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/init.c:155:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( path, mdb->mi_dbenv_home ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/init.c:420:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( v2, version ); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:695:16: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. idx.bv_len = snprintf( idx.bv_val, sizeof( ibuf ), SLAP_X_ORDERED_FMT, i ); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1393:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( bv2.bv_val, bv.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1395:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( &bv2.bv_val[bv.bv_len + 1], bc.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1419:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( p2, p1 ); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1454:15: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. int len = snprintf( buf, sizeof( buf ), SLAP_X_ORDERED_FMT, i ); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/map.c:465:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len - 2], vtmp.bv_len + 3, data/openldap-2.4.56+dfsg/servers/slapd/back-meta/map.c:480:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len - 1], vtmp.bv_len + 3, data/openldap-2.4.56+dfsg/servers/slapd/back-meta/map.c:495:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len - 1], vtmp.bv_len + 3, data/openldap-2.4.56+dfsg/servers/slapd/back-meta/map.c:541:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len-1], vtmp.bv_len + 2, data/openldap-2.4.56+dfsg/servers/slapd/back-meta/suffixmassage.c:173:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( &res->bv_val[diff], dc->target->mt_rwmap.rwm_suffix_massage[i+dst].bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2359:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( dn.bv_val, monitor_subsys[ i ]->mss_name ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/init.cpp:152:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( sqlbuf, "CREATE DATABASE IF NOT EXISTS %s", ni->ni_dbname ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/init.cpp:161:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( sqlbuf, "USE %s", ni->ni_dbname ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/init.cpp:201:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ptr += sprintf( ptr, "`%s` VARCHAR(%d), ", data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:180:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. *ptr += sprintf( *ptr, ", `%s` BLOB", ai->na_attr->sat_cname.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:182:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. *ptr += sprintf( *ptr, ", `%s` VARCHAR(%d)", ai->na_attr->sat_cname.bv_val, data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:197:15: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ptr = buf + sprintf( buf, data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:275:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( oci->no_table.bv_val, oc->soc_cname.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:395:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( oci->no_table.bv_val, oc->soc_cname.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:450:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( oci->no_table.bv_val, sname->bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:477:14: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ptr = buf + sprintf( buf, data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:485:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ptr += sprintf( ptr, ", `%s` VARCHAR(%d)", ai->na_attr->sat_cname.bv_val, data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:488:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ptr += sprintf( ptr, ", INDEX (`%s`)", ai->na_attr->sat_cname.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp:324:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dptr->dn.bv_val, npdn.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c:295:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( val.bv_val, "uid=%s,%s", data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c:345:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( s, pw->pw_name ); data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c:347:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( s, val.bv_val + i + 1 ); data/openldap-2.4.56+dfsg/servers/slapd/back-shell/fork.c:92:3: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv( args[0], args ); data/openldap-2.4.56+dfsg/servers/slapd/back-shell/result.c:89:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( bp, line ); data/openldap-2.4.56+dfsg/servers/slapd/back-sock/result.c:95:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( bp, line ); data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:863:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( logbuf, sizeof( logbuf ), "val[%lu], id=" BACKSQL_IDNUMFMT, data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:1394:3: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buf, sizeof(buf), data/openldap-2.4.56+dfsg/servers/slapd/back-sql/init.c:283:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buf, sizeof( buf ), data/openldap-2.4.56+dfsg/servers/slapd/back-sql/init.c:288:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buf, sizeof( buf ), data/openldap-2.4.56+dfsg/servers/slapd/back-sql/init.c:294:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( buf, sizeof( buf ), "%s(" /* ?) */ , data/openldap-2.4.56+dfsg/servers/slapd/back-sql/rdbms_depend/timesten/dnreverse/dnreverse.cpp:170:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(oDn, oldDnP); data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c:202:15: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. sbv.bv_len = snprintf( s, sizeof( s ), BACKSQL_IDNUMFMT, oc_map->bom_id ); data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1584:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( g->ga_ndn, gr_ndn->bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1632:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access ) data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1668:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ( op->o_conn && access > ACL_NONE && data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1670:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access, &acl_state ) == 0 ) data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1707:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ( op->o_conn && access > ACL_NONE && data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1709:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access, &acl_state ) == 0 ) data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1720:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ( op->o_conn && access > ACL_NONE && data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1723:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access, data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1766:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access ) data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1779:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. entry_at, vals, access ); data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1793:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access, data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1805:10: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. assert( access > ACL_NONE ); data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1835:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. NULL, access, NULL, mask ) == 0 ) data/openldap-2.4.56+dfsg/servers/slapd/backend.c:1875:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. nval, access, NULL, mask ) == 0 ) data/openldap-2.4.56+dfsg/servers/slapd/backglue.c:1506:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access, data/openldap-2.4.56+dfsg/servers/slapd/backglue.c:1518:58: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. rc = be->bd_info->bi_access_allowed ( op, e, desc, val, access, state, maskp ); data/openldap-2.4.56+dfsg/servers/slapd/backover.c:256:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access, data/openldap-2.4.56+dfsg/servers/slapd/backover.c:290:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. desc, val, access, state, maskp ); data/openldap-2.4.56+dfsg/servers/slapd/backover.c:311:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. desc, val, access, state, maskp ); data/openldap-2.4.56+dfsg/servers/slapd/backover.c:542:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access ) data/openldap-2.4.56+dfsg/servers/slapd/backover.c:569:32: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. entry_ndn, entry_at, vals, access ); data/openldap-2.4.56+dfsg/servers/slapd/backover.c:590:31: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. entry_ndn, entry_at, vals, access ); data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:946:18: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. bv.bv_len = snprintf( buf, sizeof( buf ), SLAP_X_ORDERED_FMT, i ); data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1059:18: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. abv.bv_len = snprintf( ibuf, sizeof( ibuf ), SLAP_X_ORDERED_FMT, i ); data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1107:19: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. bv.bv_len = sprintf( bv.bv_val, "%d %s", si->si_num, data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1167:18: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. bv.bv_len = snprintf( bv.bv_val, sizeof( c->log ), data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1206:19: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. idx.bv_len = snprintf( idx.bv_val, sizeof( ibuf ), SLAP_X_ORDERED_FMT, i ); data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1902:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( si->si_url.bv_val, c->argv[2] ); data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:3445:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf( out, data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:3591:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( next, numbuf ); data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:4590:16: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. ival.bv_len = snprintf( ibuf, sizeof( ibuf ), SLAP_X_ORDERED_FMT, idx ); data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:6630:24: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. c->value_dn.bv_len = snprintf(c->value_dn.bv_val, sizeof( c->log ), "cn=" SLAP_X_ORDERED_FMT, c->depth); data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:6673:24: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. c->value_dn.bv_len = snprintf(c->value_dn.bv_val, sizeof( c->log ), "cn=module" SLAP_X_ORDERED_FMT, i); data/openldap-2.4.56+dfsg/servers/slapd/config.c:2227:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( line + lcur, buf ); \ data/openldap-2.4.56+dfsg/servers/slapd/connection.c:1563:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( peername, "IP=%s:%d", peeraddr_string, data/openldap-2.4.56+dfsg/servers/slapd/connection.c:1570:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( peername, "IP=[%s]:%d", peeraddr_string, data/openldap-2.4.56+dfsg/servers/slapd/connection.c:1582:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( peername, "IP=%s:%d", data/openldap-2.4.56+dfsg/servers/slapd/cr.c:458:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( bva[i].bv_val, ibuf ); data/openldap-2.4.56+dfsg/servers/slapd/cr.c:459:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( bva[i].bv_val + idx.bv_len, bv.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:710:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( lutil_strcopy(slapd_srvurls[i], data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:716:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( lutil_strcopy(slapd_srvurls[i], data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1210:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ((struct sockaddr_un *)*sap)->sun_path, host ); data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1427:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( (char *)url, "%s://%s/", lud->lud_scheme, lud->lud_host ); data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2018:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( peername, "PATH=%s", from.sa_un_addr.sun_path ); data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2057:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( peername, "IP=%s:%d", peeraddr, data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2064:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( peername, "IP=[%s]:%d", peeraddr, data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2078:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( peername, "IP=%s:%d", peeraddr, data/openldap-2.4.56+dfsg/servers/slapd/dn.c:1158:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ptr, parent_dn->bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/filter.c:718:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len - 2], data/openldap-2.4.56+dfsg/servers/slapd/filter.c:739:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len - 1], data/openldap-2.4.56+dfsg/servers/slapd/filter.c:759:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len - 1], data/openldap-2.4.56+dfsg/servers/slapd/filter.c:801:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len-1], data/openldap-2.4.56+dfsg/servers/slapd/filter.c:1255:3: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len-1], tmp.bv_len + 2, data/openldap-2.4.56+dfsg/servers/slapd/filter.c:1354:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len-2], tmp.bv_len+3, data/openldap-2.4.56+dfsg/servers/slapd/filter.c:1372:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len-1], tmp.bv_len+3, data/openldap-2.4.56+dfsg/servers/slapd/filter.c:1388:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len-1], tmp.bv_len+3, data/openldap-2.4.56+dfsg/servers/slapd/limits.c:888:26: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. (WHATSLEFT <= (tmpLen = snprintf args) ? -1 : ((void) (ptr += tmpLen), 0)) data/openldap-2.4.56+dfsg/servers/slapd/main.c:338:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf( stderr, data/openldap-2.4.56+dfsg/servers/slapd/module.c:63:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ebuf, error ); data/openldap-2.4.56+dfsg/servers/slapd/module.c:85:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ebuf, error ); data/openldap-2.4.56+dfsg/servers/slapd/module.c:186:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( module->name, file_name ); data/openldap-2.4.56+dfsg/servers/slapd/module.c:189:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( file, file_name ); data/openldap-2.4.56+dfsg/servers/slapd/module.c:200:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ebuf, error ); data/openldap-2.4.56+dfsg/servers/slapd/module.c:285:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ebuf, path); data/openldap-2.4.56+dfsg/servers/slapd/module.c:295:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ebuf, name); data/openldap-2.4.56+dfsg/servers/slapd/oc.c:870:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( bva[i].bv_val, ibuf ); data/openldap-2.4.56+dfsg/servers/slapd/oc.c:871:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( bva[i].bv_val + idx.bv_len, bv.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/oidm.c:67:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp, om->som_oid.bv_val); data/openldap-2.4.56+dfsg/servers/slapd/oidm.c:71:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmp+suflen, oid+pos+1); data/openldap-2.4.56+dfsg/servers/slapd/oidm.c:211:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ptr, om->som_subs[j].bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1305:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( rdnbuf, RDNEQ ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1307:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( nrdnbuf, RDNEQ ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1322:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( nrdn.bv_val + STRLENOF(RDNEQ), ntimestamp.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/dyngroup.c:65:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ptr, ap->ap_uri->ad_cname.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:911:12: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. ptr += snprintf( c->cr_msg, sizeof( c->cr_msg ), data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1073:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1083:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1096:6: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1105:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1113:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1125:6: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1135:6: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1176:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1186:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, sizeof( c->cr_msg ), DYNLIST_USAGE data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1216:6: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, sizeof( c->cr_msg ), data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1230:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, sizeof( c->cr_msg ), data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1260:6: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, sizeof( c->cr_msg ), data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:1342:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( c->cr_msg, sizeof( c->cr_msg ), data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:1120:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( temp, temp+ber2->bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:3891:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ptr, c->cr_msg ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:4128:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( c->cr_msg, text ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:1021:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nowstr_usec, nowstr); data/openldap-2.4.56+dfsg/servers/slapd/overlays/retcode.c:866:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. bv.bv_len = snprintf( buf, sizeof( buf ), SLAP_X_ORDERED_FMT, i ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmmap.c:650:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len - 2], vtmp.bv_len + 3, data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmmap.c:667:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len - 1], vtmp.bv_len + 3, data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmmap.c:683:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len - 1], vtmp.bv_len + 3, data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmmap.c:731:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( &fstr->bv_val[len-1], vtmp.bv_len + 2, data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:572:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( maxcsn->bv_val, a->a_vals[0].bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:719:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( cbuf, cf.f_av_value.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:2431:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ptr, so->s_filterstr.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:2449:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( g2->ga_ndn, g1->ga_ndn ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/valsort.c:127:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ptr, bv.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/passwd.c:600:7: [4] (crypto) crypt: The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment (CWE-327). Use a different algorithm, such as SHA-256, with a larger, non-repeating salt. cr = crypt( key, salt ); data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:52:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access, data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:55:38: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. #define access_allowed(op,e,desc,val,access,state) access_allowed_mask(op,e,desc,val,access,state,NULL) data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:55:86: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. #define access_allowed(op,e,desc,val,access,state) access_allowed_mask(op,e,desc,val,access,state,NULL) data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:61:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access, data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:69:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access, data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:107:57: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LDAP_SLAPD_F (char *) access2str LDAP_P(( slap_access_t access )); data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:258:64: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. BerVarray *bva, AttributeType *start, AttributeType *end, int system )); data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:415:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:424:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access, data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:823:60: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. BerVarray *bva, ContentRule *start, ContentRule *end, int system )); data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:1446:60: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. BerVarray *bva, ObjectClass *start, ObjectClass *end, int system )); data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:1459:54: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. BerVarray *bva, OidMacro *start, OidMacro *end, int system )); data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:1895:50: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. BerVarray *bva, Syntax *start, Syntax *end, int system )); data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:2117:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access )); data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:2123:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access, data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:2182:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = snprintf( buf, sizeof( buf ), UI2BV_FORMAT, (ui) ); \ data/openldap-2.4.56+dfsg/servers/slapd/referral.c:115:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( &muck.bv_val[ntargetDN.bv_len-nbaseDN.bv_len], data/openldap-2.4.56+dfsg/servers/slapd/result.c:80:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(v2, text); data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:975:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ret->filter.bv_val, lud->lud_filter ); data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:1066:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ptr, filter ); data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.c:357:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf( stderr, fmt, ap ); data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.h:94:59: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void debug_printf(const char *, ...) LDAP_GCCATTR((format(printf, 1, 2))); data/openldap-2.4.56+dfsg/servers/slapd/slap.h:1375:25: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. #define ACL_ACCESS2PRIV(access) ((0x01U << ACL_LEVEL((access))) | ACL_QUALIFIERS((access))) data/openldap-2.4.56+dfsg/servers/slapd/slap.h:1375:56: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. #define ACL_ACCESS2PRIV(access) ((0x01U << ACL_LEVEL((access))) | ACL_QUALIFIERS((access))) data/openldap-2.4.56+dfsg/servers/slapd/slap.h:1375:84: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. #define ACL_ACCESS2PRIV(access) ((0x01U << ACL_LEVEL((access))) | ACL_QUALIFIERS((access))) data/openldap-2.4.56+dfsg/servers/slapd/slap.h:2178:64: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. AttributeDescription *desc, struct berval *val, slap_access_t access, data/openldap-2.4.56+dfsg/servers/slapd/slap.h:2185:33: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. BerVarray *vals, slap_access_t access )); data/openldap-2.4.56+dfsg/servers/slapd/slapacl.c:327:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. switch ( access ) { data/openldap-2.4.56+dfsg/servers/slapd/slapacl.c:362:49: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. rc = access_allowed_mask( op, ep, desc, valp, access, data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.c:299:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( leakfilename, "%s.leak", progname ); data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.c:1143:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( maxcsn[ sid ].bv_val, attr->a_nvals[0].bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/printmsg.c:82:3: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf( fp, fmt, arglist ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/proto-slapi.h:33:144: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LDAP_SLAPI_F (int) slapi_int_access_allowed LDAP_P((Operation *op, Entry *entry, AttributeDescription *desc, struct berval *val, slap_access_t access, AccessControlState *state )); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_overlay.c:724:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access, data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_overlay.c:742:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. rc = slapi_int_access_allowed( op, e, desc, val, access, state ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_overlay.c:844:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( g->ga_ndn, gr_ndn->bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2589:26: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. struct berval *val, int access ) data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2605:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. switch ( access & SLAPI_ACL_ALL ) { data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:3034:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. slap_access_t access, data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:3047:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. switch ( access ) { data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:2345:30: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. op2.ors_filterstr.bv_len = sprintf(op2.ors_filterstr.bv_val, data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5013:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( rnc+2, si->si_suffixm.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5207:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf( si->si_ridtxt, IDSTR "=%03d", si->si_rid ); data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5802:8: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = snprintf( ptr, WHATSLEFT, IDSTR "=%03d " PROVIDERSTR "=%s", data/openldap-2.4.56+dfsg/servers/slapd/syntax.c:448:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( bva[i].bv_val, ibuf ); data/openldap-2.4.56+dfsg/servers/slapd/syntax.c:449:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( bva[i].bv_val + idx.bv_len, bv.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/value.c:286:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( tmp.bv_val, ibv.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/value.c:303:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( tmp.bv_val, ibv.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/value.c:360:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(a->a_nvals[i].bv_val, ptr ); data/openldap-2.4.56+dfsg/servers/slapd/value.c:366:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(a->a_nvals[i].bv_val, ptr); data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:133:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). ptr = strcpy( ptr, vals[n].val ) + vals[n].len; data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:171:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( line, prev_eol ? "" : *sep ? sep : "\n" ); data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:740:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fbuf, "%.*s%d%s", flen, filter, r, ftail); data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:80:33: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). #define ArgDup(x) strdup(strcat(strcat(strcpy(argbuf,"\""),x),"\"")) data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:527:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( scmd, sizeof scmd, "%s" LDAP_DIRSEP SEARCHCMD, data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:588:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( rcmd, sizeof rcmd, "%s" LDAP_DIRSEP READCMD, data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:642:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( ncmd, sizeof ncmd, "%s" LDAP_DIRSEP MODRDNCMD, data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:685:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( mcmd, sizeof mcmd, "%s" LDAP_DIRSEP MODIFYCMD, data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:730:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( acmd, sizeof acmd, "%s" LDAP_DIRSEP ADDCMD, data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:773:2: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf( bcmd, sizeof bcmd, "%s" LDAP_DIRSEP BINDCMD, data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:1109:3: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp( prog, args ); data/openldap-2.4.56+dfsg/clients/tools/common.c:418:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while (( i = getopt( argc, argv, options )) != EOF ) { data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:795:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if((def_tmpdir = getenv("TMPDIR")) == NULL && data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:796:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. (def_tmpdir = getenv("TMP")) == NULL && data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:797:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. (def_tmpdir = getenv("TEMP")) == NULL ) data/openldap-2.4.56+dfsg/clients/tools/ldapurl.c:179:13: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. int opt = getopt( argc, argv, "S:h:p:b:a:s:f:E:H:" ); data/openldap-2.4.56+dfsg/include/getopt-compat.h:32:9: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. #define getopt lutil_getopt data/openldap-2.4.56+dfsg/include/getopt-compat.h:36:20: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. LDAP_LUTIL_F (int) getopt LDAP_P(( int, char * const [], const char *)); data/openldap-2.4.56+dfsg/libraries/libldap/dntest.c:51:13: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. int opt = getopt( argc, argv, "d:" ); data/openldap-2.4.56+dfsg/libraries/libldap/ftest.c:52:17: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while( (c = getopt( argc, argv, "d:" )) != EOF ) { data/openldap-2.4.56+dfsg/libraries/libldap/init.c:331:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. home = getenv("HOME"); data/openldap-2.4.56+dfsg/libraries/libldap/init.c:382:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. value = getenv(buf); data/openldap-2.4.56+dfsg/libraries/libldap/init.c:669:6: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( getenv("LDAPNOINIT") != NULL ) { data/openldap-2.4.56+dfsg/libraries/libldap/init.c:676:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *user = getenv("USER"); data/openldap-2.4.56+dfsg/libraries/libldap/init.c:678:29: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( user == NULL ) user = getenv("USERNAME"); data/openldap-2.4.56+dfsg/libraries/libldap/init.c:679:29: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( user == NULL ) user = getenv("LOGNAME"); data/openldap-2.4.56+dfsg/libraries/libldap/init.c:697:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *altfile = getenv(LDAP_ENV_PREFIX "CONF"); data/openldap-2.4.56+dfsg/libraries/libldap/init.c:710:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *altfile = getenv(LDAP_ENV_PREFIX "RC"); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:295:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while (( c = getopt( argc, argv, "h:d:s:p:t:T:" )) != -1 ) { data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:273:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *s = getenv( "LDAP_THREAD_DEBUG" ); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_dump.c:187:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((i = getopt(argc, argv, "af:lnps:V")) != EOF) { data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_load.c:309:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((i = getopt(argc, argv, "f:ns:NTV")) != EOF) { data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_stat.c:70:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((i = getopt(argc, argv, "Vaefnrs:")) != EOF) { data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest.c:38:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest2.c:40:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:41:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:41:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:43:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/openldap-2.4.56+dfsg/libraries/liblutil/getopt.c:71:5: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. int getopt (int argc, char * const argv [], const char * opts) data/openldap-2.4.56+dfsg/libraries/librewrite/rewrite.c:133:13: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. int opt = getopt( argc, argv, "d:f:hr:" ); data/openldap-2.4.56+dfsg/servers/slapd/main.c:466:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ( (i = getopt( argc, argv, data/openldap-2.4.56+dfsg/servers/slapd/main.c:763:8: [3] (misc) chroot: chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22). Make sure the program immediately chdir("/"), closes file descriptors, and drops root privileges, and that all necessary files (and no more!) are in the new root. if ( chroot( sandbox ) ) { data/openldap-2.4.56+dfsg/servers/slapd/overlays/retcode.c:740:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand( getpid() ); data/openldap-2.4.56+dfsg/servers/slapd/result.c:147:31: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ( no_assert == 0 && (s = getenv( "NO_RS_ASSERT" )) && *s ) { data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/passwd-shell.c:68:18: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while (( c = getopt( argc, argv, "d" )) != EOF ) { data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.c:106:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return ((random() & 0x07 ) == 0x07) /* XXX random for now */ data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.c:357:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ( (i = getopt( argc, argv, options )) != EOF ) { data/openldap-2.4.56+dfsg/servers/slapd/slappasswd.c:124:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while( (i = getopt( argc, argv, data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:218:24: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *backend = getenv( "BACKEND" ), *specs = "", *tmp; data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:226:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ( (i = getopt( argc, argv, "b:s:" )) != EOF ) { data/openldap-2.4.56+dfsg/tests/progs/slapd-addel.c:90:16: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ( ( i = getopt( argc, argv, "CD:Ff:H:h:i:L:l:p:r:t:w:" ) ) != EOF ) data/openldap-2.4.56+dfsg/tests/progs/slapd-bind.c:123:16: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ( ( i = getopt( argc, argv, "a:B:b:D:Ff:H:h:Ii:L:l:p:t:w:" ) ) != EOF ) data/openldap-2.4.56+dfsg/tests/progs/slapd-common.c:204:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand( pid ); data/openldap-2.4.56+dfsg/tests/progs/slapd-modify.c:84:16: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ( ( i = getopt( argc, argv, "a:CD:e:FH:h:i:L:l:p:r:t:w:" ) ) != EOF ) data/openldap-2.4.56+dfsg/tests/progs/slapd-modrdn.c:85:16: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ( ( i = getopt( argc, argv, "CD:e:FH:h:i:L:l:p:r:t:w:" ) ) != EOF ) data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:188:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ( (i = getopt( argc, argv, "ACc:D:e:Ff:H:h:i:L:l:M:m:Np:r:t:T:w:v" )) != EOF ) { data/openldap-2.4.56+dfsg/tests/progs/slapd-read.c:113:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ( (i = getopt( argc, argv, "ACD:e:Ff:H:h:i:L:l:p:r:St:T:w:" )) != EOF ) { data/openldap-2.4.56+dfsg/tests/progs/slapd-search.c:121:16: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ( ( i = getopt( argc, argv, "Aa:b:CD:f:FH:h:i:l:L:Np:r:Ss:t:T:w:" ) ) != EOF ) data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:220:16: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ( ( i = getopt( argc, argv, "AB:CD:d:FH:h:Ii:j:L:l:NP:p:r:St:Ww:y:" ) ) != EOF ) data/openldap-2.4.56+dfsg/clients/tools/common.c:194:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namebuf[ MAXHOSTNAMELEN ]; data/openldap-2.4.56+dfsg/clients/tools/common.c:1512:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msgbuf[256]; data/openldap-2.4.56+dfsg/clients/tools/common.c:1569:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( msgbuf+len, data/openldap-2.4.56+dfsg/clients/tools/common.c:1573:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( msgbuf+len, data/openldap-2.4.56+dfsg/clients/tools/common.c:2033:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ ], *ptr = buf; data/openldap-2.4.56+dfsg/clients/tools/common.c:2082:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ ]; data/openldap-2.4.56+dfsg/clients/tools/common.c:2103:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ ]; data/openldap-2.4.56+dfsg/clients/tools/common.c:2267:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ ], *ptr = buf; data/openldap-2.4.56+dfsg/clients/tools/common.c:2351:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (unsigned char *) ctrls[i]->ldctl_value.bv_val, data/openldap-2.4.56+dfsg/clients/tools/ldapdelete.c:168:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ 4096 ]; data/openldap-2.4.56+dfsg/clients/tools/ldapdelete.c:179:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (( fp = fopen( infile, "r" )) == NULL ) { data/openldap-2.4.56+dfsg/clients/tools/ldapexop.c:143:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ttl = atoi( argv[ 2 ] ); data/openldap-2.4.56+dfsg/clients/tools/ldapmodify.c:264:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (( rejfp = fopen( rejfile, "w" )) == NULL ) { data/openldap-2.4.56+dfsg/clients/tools/ldapmodify.c:338:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( rejbuf, rbuf, len+1 ); data/openldap-2.4.56+dfsg/clients/tools/ldapmodrdn.c:186:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (( fp = fopen( infile, "r" )) == NULL ) { data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:843:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). } else if (( fp = fopen( infile, "r" )) == NULL ) { data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:900:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (( fp = fopen( infile, "r" )) == NULL ) { data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1251:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[12]; data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1290:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1612:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpfname[ 256 ]; data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1613:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char url[ 256 ]; data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1672:14: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). tmpfd = mkstemp( tmpfname ); data/openldap-2.4.56+dfsg/contrib/ldapc++/src/LdifReader.cpp:283:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outbuf[value.size()]; data/openldap-2.4.56+dfsg/contrib/ldapc++/src/SaslInteractionHandler.cpp:61:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&old_attr, &attr, sizeof(attr)); data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:125:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shortbuf[16]; data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:133:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(shortbuf, "0x%03x", code); data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:305:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filter[BUFSIZ]; data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:359:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[100]; data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:360:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "\n (\"search\" body line %d)", data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:733:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. free ((char *) modArray[i]->mod_vals.modv_strvals); data/openldap-2.4.56+dfsg/contrib/ldaptcl/neoXldap.c:734:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. free ((char *) modArray[i]); data/openldap-2.4.56+dfsg/contrib/slapd-modules/acl/gssacl.c:202:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ACL_BUF_SIZE]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/acl/gssacl.c:283:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newbuf[ACL_BUF_SIZE]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/acl/gssacl.c:297:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[ACL_BUF_SIZE]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/acl/posixgroup.c:208:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ 1024 ]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/autogroup/autogroup.c:369:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/autogroup/autogroup.c:880:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:111:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->type_id)->identifier.bv_val, "type_id"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:127:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->value)->identifier.bv_val, "value"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:339:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->type_id)->identifier.bv_val, "type_id"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:352:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->value)->identifier.bv_val, "value"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:376:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->extension)->identifier.bv_val, "extension"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:649:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.teletexString)->identifier.bv_val, "teletexString"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:659:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.printableString)->identifier.bv_val, "printableString"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:669:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.universalString)->identifier.bv_val, "universalString"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:679:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.utf8String)->identifier.bv_val, "utf8String"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:689:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.bmpString)->identifier.bv_val, "bmpString"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:901:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->nameAssigner)->identifier.bv_val, "nameAssigner"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:919:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->partyName)->identifier.bv_val, "partyName"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1243:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.otherName)->identifier.bv_val, "otherName"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1263:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.rfc822Name)->identifier.bv_val, "rfc822Name"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1283:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.dNSName)->identifier.bv_val, "dNSName"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1301:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.x400Address)->identifier.bv_val, "x400Address"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1316:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.directoryName)->identifier.bv_val, "directoryName"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1334:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.ediPartyName)->identifier.bv_val, "ediPartyName"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1354:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.uniformResourceIdentifier)->identifier.bv_val, "uniformResourceIdentifier"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1374:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.iPAddress)->identifier.bv_val, "iPAddress"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1392:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.registeredID)->identifier.bv_val, "registeredID"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1876:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->keyIdentifier)->identifier.bv_val, "keyIdentifier"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1899:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->authorityCertIssuer)->identifier.bv_val, "authorityCertIssuer"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1920:17: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->authorityCertSerialNumber)->identifier.bv_val, "authorityCertSerialNumber"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:74:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:121:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:158:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:211:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:240:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.h:300:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:170:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->algorithm)->identifier.bv_val, "algorithm"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:194:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->parameters)->identifier.bv_val, "parameters"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:410:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.utcTime)->identifier.bv_val, "utcTime"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:420:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.generalizedTime)->identifier.bv_val, "generalizedTime"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:610:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->extnID)->identifier.bv_val, "extnID"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:625:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->critical)->identifier.bv_val, "critical"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:638:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->extnValue)->identifier.bv_val, "extnValue"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:659:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->critical)->identifier.bv_val, "critical"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:872:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->type)->identifier.bv_val, "type"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:885:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->value)->identifier.bv_val, "value"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1092:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->notBefore)->identifier.bv_val, "notBefore"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1110:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->notAfter)->identifier.bv_val, "notAfter"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1315:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->algorithm)->identifier.bv_val, "algorithm"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1331:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->subjectPublicKey)->identifier.bv_val, "subjectPublicKey"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2257:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->a.rdnSequence)->identifier.bv_val, "rdnSequence"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2533:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->version)->identifier.bv_val, "version"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2547:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->serialNumber)->identifier.bv_val, "serialNumber"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2562:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->signature)->identifier.bv_val, "signature"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2577:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->issuer)->identifier.bv_val, "issuer"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2592:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->validity)->identifier.bv_val, "validity"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2607:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->subject)->identifier.bv_val, "subject"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2622:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->subjectPublicKeyInfo)->identifier.bv_val, "subjectPublicKeyInfo"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2649:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->issuerUniqueIdentifier)->identifier.bv_val, "issuerUniqueIdentifier"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2673:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->subjectUniqueIdentifier)->identifier.bv_val, "subjectUniqueIdentifier"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2705:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->extensions)->identifier.bv_val, "extensions"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2725:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->version)->identifier.bv_val, "version"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3076:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->toBeSigned)->identifier.bv_val, "toBeSigned"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3091:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->signatureAlgorithm)->identifier.bv_val, "signatureAlgorithm"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3107:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->signature)->identifier.bv_val, "signature"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:100:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:123:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:154:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:178:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:201:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:224:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:292:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:321:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.h:352:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2142:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ( a->oid.octs, oid->octs, oid->octetLen ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2220:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_OID_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2249:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( out->bv_val + *pos, buf, rc ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2265:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( out->bv_val + *pos, buf, rc ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2283:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( out->bv_val + start_pos, at->sat_cname.bv_val, desc_size ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2305:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( out->bv_val + *pos, value_ptr, value_size ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:57:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:94:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:112:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:171:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:182:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:201:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:219:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:239:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:258:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:276:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:295:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:313:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:333:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:351:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:369:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:408:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:509:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oe_oid[MAX_OID_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.h:575:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:125:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->userCertificate)->identifier.bv_val, "userCertificate"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:143:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->revocationDate)->identifier.bv_val, "revocationDate"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:169:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->crlEntryExtensions)->identifier.bv_val, "crlEntryExtensions"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:696:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->version)->identifier.bv_val, "version"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:708:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->signature)->identifier.bv_val, "signature"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:723:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->issuer)->identifier.bv_val, "issuer"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:741:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->thisUpdate)->identifier.bv_val, "thisUpdate"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:759:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->nextUpdate)->identifier.bv_val, "nextUpdate"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:771:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->revokedCertificates)->identifier.bv_val, "revokedCertificates"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:806:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->crlExtensions)->identifier.bv_val, "crlExtensions"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1117:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->tbsCertList)->identifier.bv_val, "tbsCertList"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1132:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (k->signatureAlgorithm)->identifier.bv_val, "signatureAlgorithm"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1148:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( (&k->signature)->identifier.bv_val, "signature"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:67:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:90:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:121:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:145:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:183:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:252:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:281:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:309:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.h:333:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id_buf[MAX_IDENTIFIER_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1][128]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:332:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy ( bv->bv_val , "TRUE" ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:336:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy ( bv->bv_val , "FALSE" ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:599:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oid[MAX_OID_LEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:762:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( nval->bv_val, bv.bv_val, bv.bv_len ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c:169:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(fname, "r"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c:371:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[BUFSIZ]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastbind/lastbind.c:136:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nowstr[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastmod/lastmod.c:370:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE ]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastmod/lastmod.c:382:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastmod/lastmod.c:832:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ 8192 ]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastmod/lastmod.c:833:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tmbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/lastmod/lastmod.c:835:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE ]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/alias.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256];); data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/alias.c:97:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/ether.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/ether.c:125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/ether.c:140:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/group.c:65:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/group.c:277:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/group.c:299:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/group.c:316:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/host.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/host.c:117:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/host.c:132:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[64]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/host.c:134:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/netgroup.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/netgroup.c:190:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/network.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/network.c:117:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/network.c:132:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[64]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/network.c:134:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.c:213:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, fp->readbuffer.buffer + fp->readbuffer.start, count); data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.c:225:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, fp->readbuffer.buffer + fp->readbuffer.start, data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.c:433:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fp->writebuffer.buffer + fp->writebuffer.start + data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.c:441:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fp->writebuffer.buffer + fp->writebuffer.start + data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:210:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(dst->bv_val+pos,"\\2a"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:214:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(dst->bv_val+pos,"\\28"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:218:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(dst->bv_val+pos,"\\29"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:222:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(dst->bv_val+pos,"\\5c"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:296:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char authid[sizeof("gidNumber=4294967295+uidNumber=424967295,cn=peercred,cn=external,cn=auth")]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:297:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char peerbuf[8]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:308:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. op->o_dn.bv_len = sprintf(authid,"gidNumber=%d+uidNumber=%d,cn=peercred,cn=external,cn=auth", data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:88:23: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. pi->msg.bv_len = sprintf(pi->msg.bv_val, data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:221:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uidc[32]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:222:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char svcc[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:223:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ruserc[32]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:224:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rhostc[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ttyc[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:226:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pwdc[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:346:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uidc[32]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:347:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char svcc[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:348:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ruserc[32]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:349:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rhostc[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:350:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ttyc[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:389:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:568:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char svcc[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:569:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uidc[32]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:570:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ttyc[32]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:571:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rhostc[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:572:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ruserc[32]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:573:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sessionID[64]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:577:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[LDAP_LUTIL_GENTIME_BUFSIZE]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:719:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uidc[32]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:720:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char svcc[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:721:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ruserc[32]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:722:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rhostc[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:723:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ttyc[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:725:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opwc[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:726:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char npwc[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/passwd.c:166:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/passwd.c:200:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/passwd.c:395:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/passwd.c:414:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/protocol.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/protocol.c:122:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/protocol.c:137:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/rpc.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/rpc.c:124:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/rpc.c:139:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/service.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[1024],buf3[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/service.c:80:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/service.c:108:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nbuf[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/service.c:109:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pbuf[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/service.c:211:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/service.c:228:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/shadow.c:81:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[8]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/shadow.c:153:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/shadow.c:238:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[1024]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/apr1.c:120:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[LUTIL_MD5_BYTES]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/apr1.c:182:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest_buf[LUTIL_MD5_BYTES]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/apr1.c:183:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char salt_buf[APR_SALT_SIZE]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/kerberos.c:183:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lrealm[REALM_SZ]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/kerberos.c:184:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tkt[MAXHOSTNAMELEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/netscape.c:35:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char MD5digest[LUTIL_MD5_BYTES], c; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/netscape.c:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[LUTIL_MD5_BYTES*2]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:113:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char salt_b64[LUTIL_BASE64_ENCODE_LEN(PBKDF2_SALT_SIZE) + 1]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dk_b64[LUTIL_BASE64_ENCODE_LEN(PBKDF2_MAX_DK_SIZE) + 1]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:146:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char salt_value[PBKDF2_SALT_SIZE]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:148:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char dk_value[PBKDF2_MAX_DK_SIZE]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:268:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char salt_value[PBKDF2_SALT_SIZE + 1]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:269:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char salt_b64[LUTIL_BASE64_ENCODE_LEN(PBKDF2_SALT_SIZE) + 1]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:271:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char dk_value[PBKDF2_MAX_DK_SIZE + 1]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:272:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dk_b64[LUTIL_BASE64_ENCODE_LEN(PBKDF2_MAX_DK_SIZE) + 1]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:273:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char input_dk_value[PBKDF2_MAX_DK_SIZE]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/pbkdf2/pw-pbkdf2.c:338:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). iteration = atoi(passwd->bv_val); data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.c:178:29: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define MEMCPY_BCOPY(d,s,l) memcpy((d), (s), (l)) data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.c:182:29: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define MEMCPY_BCOPY(d,s,l) bcopy((s), (d), (l)) data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.c:657:54: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* SHA256_Data(const sha2_byte* data, size_t len, char digest[SHA256_DIGEST_STRING_LENGTH]) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.c:988:54: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* SHA512_Data(const sha2_byte* data, size_t len, char digest[SHA512_DIGEST_STRING_LENGTH]) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.c:1063:54: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* SHA384_Data(const sha2_byte* data, size_t len, char digest[SHA384_DIGEST_STRING_LENGTH]) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:47:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hash256[SHA256_DIGEST_LENGTH]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char saltdata[SHA2_SALT_SIZE]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:76:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hash256[SHA256_DIGEST_LENGTH]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:95:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hash384[SHA384_DIGEST_LENGTH]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:96:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char saltdata[SHA2_SALT_SIZE]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:124:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hash384[SHA384_DIGEST_LENGTH]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:143:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hash512[SHA512_DIGEST_LENGTH]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:144:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char saltdata[SHA2_SALT_SIZE]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:172:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hash512[SHA512_DIGEST_LENGTH]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:230:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SHAdigest[SHA256_DIGEST_LENGTH]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:274:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SHAdigest[SHA256_DIGEST_LENGTH]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:318:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SHAdigest[SHA384_DIGEST_LENGTH]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:362:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SHAdigest[SHA384_DIGEST_LENGTH]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:406:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SHAdigest[SHA512_DIGEST_LENGTH]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/slapd-sha2.c:450:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SHAdigest[SHA512_DIGEST_LENGTH]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/smbk5pwd/smbk5pwd.c:71:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef unsigned char DES_cblock[8]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/smbk5pwd/smbk5pwd.c:165:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char in[HASHLEN], data/openldap-2.4.56+dfsg/contrib/slapd-modules/smbk5pwd/smbk5pwd.c:190:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char UcasePassword[15]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/smbk5pwd/smbk5pwd.c:233:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hbuf[HASHLEN]; data/openldap-2.4.56+dfsg/contrib/slapd-modules/smbk5pwd/smbk5pwd.c:520:30: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. ml->sml_values[0].bv_len = sprintf(ml->sml_values[0].bv_val, data/openldap-2.4.56+dfsg/include/ac/dirent.h:35:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_PATH+1]; data/openldap-2.4.56+dfsg/include/ac/string.h:43:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # undef memcpy data/openldap-2.4.56+dfsg/include/ac/string.h:44:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(d, s, n) ((void) bcopy ((s), (d), (n))) data/openldap-2.4.56+dfsg/include/ac/string.h:44:36: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memcpy(d, s, n) ((void) bcopy ((s), (d), (n))) data/openldap-2.4.56+dfsg/include/ac/string.h:46:37: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define memmove(d, s, n) ((void) bcopy ((s), (d), (n))) data/openldap-2.4.56+dfsg/include/ac/string.h:79:34: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define SAFEMEMCPY( d, s, n ) bcopy((s), (d), (n)) data/openldap-2.4.56+dfsg/include/ac/string.h:82:33: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define SAFEMEMCPY( d, s, n ) memcpy((d), (s), (n)) data/openldap-2.4.56+dfsg/include/avl.h:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char avl_bits[2]; data/openldap-2.4.56+dfsg/include/lber_pvt.h:31:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[size]; \ data/openldap-2.4.56+dfsg/include/lutil.h:217:1: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). mkstemp LDAP_P (( char * template )); data/openldap-2.4.56+dfsg/include/lutil_hash.h:41:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[LUTIL_HASH_BYTES], data/openldap-2.4.56+dfsg/include/lutil_md5.h:34:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char in[64]; data/openldap-2.4.56+dfsg/include/lutil_md5.h:49:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[16], data/openldap-2.4.56+dfsg/include/lutil_md5.h:55:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const unsigned char in[64])); data/openldap-2.4.56+dfsg/include/lutil_sha1.h:42:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[64]; data/openldap-2.4.56+dfsg/include/lutil_sha1.h:47:42: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LDAP_P((uint32 state[5], const unsigned char buffer[64])); data/openldap-2.4.56+dfsg/include/lutil_sha1.h:59:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LDAP_P((unsigned char digest[20], lutil_SHA1_CTX *context)); data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c:102:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c:125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c:188:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[BP_LEN]; data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c:256:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[132]; data/openldap-2.4.56+dfsg/libraries/liblber/bprint.c:268:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( buf, "ber_dump: buf=%p ptr=%p end=%p len=%ld\n", data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[4096]; data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:56:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). log_file = fopen( LDAP_RUNDIR LDAP_DIRSEP "openldap.log", "w" ); data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:59:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). log_file = fopen( "openldap.log", "w" ); data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:68:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "%08x ", (unsigned) time(0L)); data/openldap-2.4.56+dfsg/libraries/liblber/debug.c:91:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[4096]; data/openldap-2.4.56+dfsg/libraries/liblber/decode.c:71:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. ptr += sprintf( ptr, "%u", val1 ); data/openldap-2.4.56+dfsg/libraries/liblber/decode.c:73:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. ptr += sprintf( ptr, ".%lu", val ); data/openldap-2.4.56+dfsg/libraries/liblber/decode.c:328:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( buf, bv.bv_val, bv.bv_len ); data/openldap-2.4.56+dfsg/libraries/liblber/decode.c:500:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( bv->bv_val, data, bv->bv_len ); data/openldap-2.4.56+dfsg/libraries/liblber/decode.c:537:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( bv->bv_val, data, bv->bv_len ); data/openldap-2.4.56+dfsg/libraries/liblber/decode.c:629:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( *buf, data.bv_val, data.bv_len ); data/openldap-2.4.56+dfsg/libraries/liblber/dtest.c:104:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openldap-2.4.56+dfsg/libraries/liblber/dtest.c:105:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fmt[2]; data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:176:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char sign, data[TAGBUF_SIZE+1 + OCTET_SIZE(ber_int_t)], *ptr; data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:230:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char header[HEADER_SIZE], *ptr; data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:285:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char unusedbits, header[HEADER_SIZE + 1], *ptr; data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:313:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char data[TAGBUF_SIZE + 1], *ptr; data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:331:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char data[TAGBUF_SIZE + 2], *ptr; data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:350:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xtagbuf[TAGBUF_SIZE + 1]; /* room for tag + len(tag or len) */ data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:353:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char padding[SOS_LENLEN-1]; /* for final length encoding */ data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:454:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( SOS_TAG_END(header), lenptr, SOS_LENLEN ); data/openldap-2.4.56+dfsg/libraries/liblber/etest.c:54:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[1024]; data/openldap-2.4.56+dfsg/libraries/liblber/etest.c:86:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (( fd = open( "lber-test", O_WRONLY|O_CREAT|O_TRUNC|O_BINARY )) data/openldap-2.4.56+dfsg/libraries/liblber/etest.c:118:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fmt[2]; data/openldap-2.4.56+dfsg/libraries/liblber/etest.c:129:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). rc = ber_printf( ber, fmt, atoi(buf) ); data/openldap-2.4.56+dfsg/libraries/liblber/etest.c:152:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tag = atoi(buf); data/openldap-2.4.56+dfsg/libraries/liblber/io.c:526:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof(ber->ber_len)-1]; data/openldap-2.4.56+dfsg/libraries/liblber/lber-int.h:141:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sb_ungetbuf[8]; data/openldap-2.4.56+dfsg/libraries/liblber/memory.c:57:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char bmu_char[4]; data/openldap-2.4.56+dfsg/libraries/liblber/memory.c:82:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char toppattern[4] = { 0xde, 0xad, 0xba, 0xde }; data/openldap-2.4.56+dfsg/libraries/liblber/memory.c:84:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char endpattern[4] = { 0xd1, 0xed, 0xde, 0xca }; data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c:124:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[LBER_MIN_BUFF_SIZE]; data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c:827:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[128]; data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c:852:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[128]; data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:115:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8192]; data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:134:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fm2[64]; data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:212:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8192]; data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c:367:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char my_hostname[HOST_NAME_MAX + 1]; data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c:481:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char authid[sizeof("gidNumber=4294967295+uidNumber=4294967295," data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c:483:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( authid, "gidNumber=%u+uidNumber=%u," data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:165:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(dn + loc, "dc="); data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:184:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostname[MAXHOST]; data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:267:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char reply[DNSBUFSIZ]; data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:301:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[DNSBUFSIZ]; data/openldap-2.4.56+dfsg/libraries/libldap/dntest.c:59:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). debug = atoi( optarg ); data/openldap-2.4.56+dfsg/libraries/libldap/fetch.c:82:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). url = fopen( p, "rb" ); data/openldap-2.4.56+dfsg/libraries/libldap/fetch.c:102:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/openldap-2.4.56+dfsg/libraries/libldap/free.c:101:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. LDAP_FREE( (char *) mods[i] ); data/openldap-2.4.56+dfsg/libraries/libldap/ftest.c:55:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). debug = atoi( optarg ); data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:133:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[256]; data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:192:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[256]; data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:227:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b + 4, wrapped.value, wrapped.length); data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:271:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[256]; data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:299:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(b, unwrapped.value, unwrapped.length); data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:353:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[256]; data/openldap-2.4.56+dfsg/libraries/libldap/init.c:154:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuf[ AC_LINE_MAX ]; data/openldap-2.4.56+dfsg/libraries/libldap/init.c:172:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(file, "r"); data/openldap-2.4.56+dfsg/libraries/libldap/init.c:244:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. p = &((char *) gopts)[attrs[i].offset]; data/openldap-2.4.56+dfsg/libraries/libldap/init.c:259:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. p = &((char *) gopts)[attrs[i].offset]; data/openldap-2.4.56+dfsg/libraries/libldap/init.c:267:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. p = &((char *) gopts)[attrs[i].offset]; data/openldap-2.4.56+dfsg/libraries/libldap/init.c:366:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_LDAP_ATTR_LEN+MAX_LDAP_ENV_PREFIX_LEN]; data/openldap-2.4.56+dfsg/libraries/libldap/init.c:402:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. p = &((char *) gopts)[attrs[i].offset]; data/openldap-2.4.56+dfsg/libraries/libldap/init.c:403:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). * (int*) p = atoi(value); data/openldap-2.4.56+dfsg/libraries/libldap/init.c:414:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. p = &((char *) gopts)[attrs[i].offset]; data/openldap-2.4.56+dfsg/libraries/libldap/init.c:422:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. p = &((char *) gopts)[attrs[i].offset]; data/openldap-2.4.56+dfsg/libraries/libldap/ldap_sync.c:598:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ ]; data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:58:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char nib2b64[0x40] = data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:61:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char b642nib[0x80] = { data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:514:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[3]; data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:783:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen( file, mode ); data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:822:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[LDIF_MAXLINE], *nbufp; data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:550:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serv[7]; data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:637:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[INET6_ADDRSTRLEN]; data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:646:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[INET_ADDRSTRLEN]; data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:718:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char address[INET_ADDR_LEN]; data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:825:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hbuf[NI_MAXHOST]; data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:827:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hbuf[MAXHOSTNAMELEN]; data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:829:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hbuf[256]; data/openldap-2.4.56+dfsg/libraries/libldap/os-local.c:110:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[128]; \ data/openldap-2.4.56+dfsg/libraries/libldap/os-local.c:212:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char control[CMSG_SPACE(sizeof(int))]; data/openldap-2.4.56+dfsg/libraries/libldap/ppolicy.c:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof("-2147483648")]; data/openldap-2.4.56+dfsg/libraries/libldap/ppolicy.c:238:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( buf, ctrl->ldctl_value.bv_val, ctrl->ldctl_value.bv_len ); data/openldap-2.4.56+dfsg/libraries/libldap/print.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ 1024 ]; data/openldap-2.4.56+dfsg/libraries/libldap/request.c:860:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[32]; data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:318:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:332:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:1302:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *len = atoi(*sp); data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:2291:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). at->at_syntax_len = atoi(sp); data/openldap-2.4.56+dfsg/libraries/libldap/search.c:352:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ ], *ptr = " *"; data/openldap-2.4.56+dfsg/libraries/libldap/search.c:445:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char escape[128] = { data/openldap-2.4.56+dfsg/libraries/libldap/t61.c:108:9: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef wchar_t wvec16[16]; data/openldap-2.4.56+dfsg/libraries/libldap/t61.c:109:9: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef wchar_t wvec32[32]; data/openldap-2.4.56+dfsg/libraries/libldap/t61.c:110:9: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef wchar_t wvec64[64]; data/openldap-2.4.56+dfsg/libraries/libldap/test.c:75:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[256]; data/openldap-2.4.56+dfsg/libraries/libldap/test.c:125:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (( fp = fopen( path, "r" )) == NULL ) { data/openldap-2.4.56+dfsg/libraries/libldap/test.c:170:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[256]; data/openldap-2.4.56+dfsg/libraries/libldap/test.c:181:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tmp.mod_op = atoi( buf ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:249:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char dn[256], passwd[256]; data/openldap-2.4.56+dfsg/libraries/libldap/test.c:276:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256], command1, command2, command3; data/openldap-2.4.56+dfsg/libraries/libldap/test.c:277:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char passwd[64], dn[256], rdn[64], attr[64], value[256]; data/openldap-2.4.56+dfsg/libraries/libldap/test.c:278:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filter[256], *host, **types; data/openldap-2.4.56+dfsg/libraries/libldap/test.c:299:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ldap_debug = atoi( optarg ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:319:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). port = atoi( optarg ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:358:29: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( ( ld->ld_sb->sb_fd = open( copyfname, O_WRONLY|O_CREAT|O_EXCL, data/openldap-2.4.56+dfsg/libraries/libldap/test.c:394:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). id = atoi( line ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:461:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ldap_debug = atoi( line ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:482:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ld->ld_msgid = atoi( line ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:487:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ld->ld_version = atoi( line ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:531:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). id = atoi( line ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:537:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). all = atoi( line ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:570:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). scope = atoi( line ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:576:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). attrsonly = atoi( line ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:589:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). timeout.tv_sec = atoi( line ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:638:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ld->ld_deref = atoi( line ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:640:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ld->ld_timelimit = atoi( line ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:642:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ld->ld_sizelimit = atoi( line ); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:648:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( line ) != 0 ) { data/openldap-2.4.56+dfsg/libraries/libldap/test.c:652:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( line ) != 0 ) { data/openldap-2.4.56+dfsg/libraries/libldap/tls2.c:383:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], *msg; data/openldap-2.4.56+dfsg/libraries/libldap/tls2.c:449:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], *msg; data/openldap-2.4.56+dfsg/libraries/libldap/tls2.c:1215:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oids[8192], *oidptr = oids, *oidbuf = NULL; data/openldap-2.4.56+dfsg/libraries/libldap/tls_g.c:150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[128]; data/openldap-2.4.56+dfsg/libraries/libldap/tls_g.c:152:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open( path, O_RDONLY ); data/openldap-2.4.56+dfsg/libraries/libldap/tls_g.c:501:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char altname[NI_MAXHOST]; data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:504:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. nss_parse_ciphers(const char *cipherstr, int cipher_list[ciphernum]) data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:913:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char phrase[200]; data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:1651:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *securitydirs[3]; data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:2653:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( buf, msg, len ); data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:2818:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2048]; data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:2842:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( buf, av->data, len ); data/openldap-2.4.56+dfsg/libraries/libldap/tls_o.c:531:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err[256] = ""; data/openldap-2.4.56+dfsg/libraries/libldap/tls_o.c:1242:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[200]; data/openldap-2.4.56+dfsg/libraries/libldap/tls_o.c:1302:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAXPATHLEN]; data/openldap-2.4.56+dfsg/libraries/libldap/url.c:1420:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *s, *p, buf[32]; /* big enough to hold a long decimal # (overkill) */ data/openldap-2.4.56+dfsg/libraries/libldap/url.c:1433:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. size += sprintf(buf, ":%d", ludp->lud_port); data/openldap-2.4.56+dfsg/libraries/libldap/url.c:1449:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, ":%d", ludp->lud_port); data/openldap-2.4.56+dfsg/libraries/libldap/utf-8-conv.c:346:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[6]; /* Large enough for biggest multibyte char */ data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c:843:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *fqdn, hostbuf[MAXHOSTNAMELEN+1]; data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c:915:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. return (char *) _(values[i].msg); data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:230:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errbuf[200]; data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:738:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[40]; data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:811:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[40], buf2[40]; data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:832:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[40], buf2[40]; data/openldap-2.4.56+dfsg/libraries/libldap_r/thr_debug.c:861:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[40], buf2[40]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:586:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define DKBUF char kbuf[DKBUF_MAXKEYSIZE*2+1] data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:707:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pad[(sizeof(MDB_rxbody)+CACHELINE-1) & ~(CACHELINE-1)]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:732:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mtb_rmname[MNAME_LEN]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:761:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pad[(sizeof(MDB_txbody)+CACHELINE-1) & ~(CACHELINE-1)]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:765:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mt2_wmname[MNAME_LEN]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:771:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pad[(MNAME_LEN+CACHELINE-1) & ~(CACHELINE-1)]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:919:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mn_data[1]; /**< key and data are appended here */ data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:1061:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mm_pad[PAGEHDRSZ]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:1485:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MSGSIZE+PADSIZE], *ptr = buf; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:1539:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[400]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:1540:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%.100s:%d: Assertion '%.200s' failed in %.40s()", data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:1584:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. ptr += sprintf(ptr, "%02x", *c++); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:1586:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%.*s", key->mv_size, key->mv_data); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:1594:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *const tp[2][2] = {{"", ": DB"}, {": sub-page", ": sub-DB"}}; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2337:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, (lower + PAGEBASE + (Align-1)) & -Align); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2338:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((pgno_t *)((char *)dst+upper), (pgno_t *)((char *)src+upper), data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2341:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, psize - unused); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2381:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(np, mp, num * env->me_psize); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2775:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(txn->mt_dbiseqs, env->me_dbiseqs, env->me_maxdbs * sizeof(unsigned int)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2779:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(txn->mt_dbs, meta->mm_dbs, CORE_DBS * sizeof(MDB_db)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2888:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(txn->mt_dbs, parent->mt_dbs, txn->mt_numdbs * sizeof(MDB_db)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:2899:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(env->me_pghead, ntxn->mnt_pgstate.mf_pghead, size); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:3186:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data.mv_data, free_pgs, data.mv_size); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:3500:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(parent->mt_dbs, txn->mt_dbs, txn->mt_numdbs * sizeof(MDB_db)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4292:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(fname->mn_val, which & MDB_O_MASK, mode); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4367:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi(uts.release+7); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4371:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi(uts.release+7); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4376:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi(uts.release+2); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4380:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi(uts.release+4); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4384:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi(uts.release+4); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4825:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char encbuf[11]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4856:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char encbuf[11]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:5645:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&flags, ((char *) data.mv_data + offsetof(MDB_db, md_flags)), data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:5652:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mc->mc_db, data.mv_data, sizeof(MDB_db)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6700:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, key->mv_data, ksize); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6761:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. dkey.mv_data = memcpy(fp+1, olddata.mv_data, olddata.mv_size); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6842:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(METADATA(mp), METADATA(fp), NUMKEYS(fp) * fp->mp_pad); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6844:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)mp + mp->mp_upper + PAGEBASE, (char *)fp + fp->mp_upper + PAGEBASE, data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6846:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((char *)(&mp->mp_ptrs), (char *)(&fp->mp_ptrs), NUMKEYS(fp) * sizeof(mp->mp_ptrs[0])); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6912:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((size_t *)((char *)np + off), data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6916:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(np, omp, sz); /* Copy beginning of page */ data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6923:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(METADATA(omp), data->mv_data, data->mv_size); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6937:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(olddata.mv_data, data->mv_data, data->mv_size); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:6939:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(NODEKEY(leaf), key->mv_data, key->mv_size); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7038:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(db, &mc->mc_xcursor->mx_db, sizeof(MDB_db)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7060:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. data[0].mv_data = (char *)data[0].mv_data + data[0].mv_size; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7122:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(db, &mc->mc_xcursor->mx_db, sizeof(MDB_db)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7310:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, key->mv_data, ksize); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7370:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(NODEKEY(node), key->mv_data, key->mv_size); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7376:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ndata, data->mv_data, sizeof(pgno_t)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7380:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ndata, data->mv_data, data->mv_size); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7382:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ndata, &ofp->mp_pgno, sizeof(pgno_t)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7387:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ndata, data->mv_data, data->mv_size); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7546:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&mx->mx_db, NODEDATA(node), sizeof(MDB_db)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7783:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kbuf2[DKBUF_MAXKEYSIZE*2+1]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:7829:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(NODEKEY(node), key->mv_data, key->mv_size); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:8717:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rp->mp_ptrs, split, rsize); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:8720:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ins, newkey->mv_data, ksize); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:8725:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rp->mp_ptrs, split, x * ksize); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:8727:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ins, newkey->mv_data, ksize); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:8728:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ins+ksize, split + x * ksize, rsize - x * ksize); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:8924:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(NODEPTR(mp, nkeys-1), NODEPTR(copy, nkeys-1), data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9063:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *mc_wbuf[2]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9064:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *mc_over[2]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9241:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(NODEDATA(ni), &my->mc_next_pgno, sizeof(pgno_t)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9252:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mo, omp, my->mc_env->me_psize); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9281:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(NODEDATA(ni), &db, sizeof(db)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9857:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&txn->mt_dbs[slot], data.mv_data, sizeof(MDB_db)); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:10108:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:10303:10: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). need = MultiByteToWideChar(CP_UTF8, 0, src, -1, result, need); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_dump.c:282:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, key.mv_data, key.mv_size); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_load.c:75:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). version=atoi((char *)dbuf.mv_data+STRLENOF("VERSION=")); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_stat.c:235:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, key.mv_data, key.mv_size); data/openldap-2.4.56+dfsg/libraries/liblmdb/midl.c:180:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ids[ids[0]+1], &app[1], app[0] * sizeof(MDB_ID)); data/openldap-2.4.56+dfsg/libraries/liblmdb/midl.h:68:34: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define MDB_IDL_CPY( dst, src ) (memcpy( dst, src, MDB_IDL_SIZEOF( src ) )) data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest.c:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sval[32] = ""; data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest.c:60:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%03x %d foo bar", values[i], values[i]); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest.c:91:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%03x ", values[i]); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest2.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sval[32] = ""; data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest2.c:63:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%03x %d foo bar", values[i], values[i]); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest2.c:90:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%03x ", values[i]); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sval[32]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kval[sizeof(int)]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:68:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(kval, "%03x", values[i]); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:69:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%03x %d foo bar", values[i], values[i]); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:94:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(kval, "%03x", values[i & ~0x0f]); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest3.c:95:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%03x %d foo bar", values[i], values[i]); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sval[8]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kval[sizeof(int)]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:64:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(kval, "001"); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:66:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%07x", values[i]); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:98:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%07x", values[3]+1); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:103:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%07x", values[255]+1); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:108:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%07x", values[500]+1); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest4.c:130:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%07x", values[i]); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sval[32]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kval[sizeof(int)]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:69:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(kval, "%03x", values[i]); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:70:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%03x %d foo bar", values[i], values[i]); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:96:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(kval, "%03x", values[i & ~0x0f]); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest5.c:97:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%03x %d foo bar", values[i], values[i]); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:27:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dkbuf[1024]; data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:64:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%08x", kval); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:71:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%08x", kval); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:78:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%08x", kval); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:100:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(kval, "%03x", values[i & ~0x0f]); data/openldap-2.4.56+dfsg/libraries/liblmdb/mtest6.c:101:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sval, "%03x %d foo bar", values[i], values[i]); data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucdata.c:96:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *fp, *dp, *pp, path[BUFSIZ]; data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucdata.c:113:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen(path, mode)) != 0) data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucdata.c:215:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. fread((char *) _ucprop_ranges, sizeof(ac_uint4), data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:508:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. realloc((char *) (*pdecomps)[i].decomp, data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:518:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (void) AC_MEMCPY((char *) (*pdecomps)[i].decomp, (char *) dectmp, data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:828:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[512], *s, *e, *first_prop; data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1219:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[512], *s; data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1300:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[BUFSIZ]; data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1314:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((out = fopen(path, "w")) == 0) data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1321:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((out = fopen(path, "wb")) == 0) data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1406:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. fwrite((char *) proptbl[i].ranges, sizeof(ac_uint4), data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1454:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((out = fopen(path, "wb")) == 0) data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1531:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((out = fopen(path, "wb")) == 0) data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1607:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((out = fopen(path, "wb")) == 0) data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1643:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. fwrite((char *) decomps[i].decomp, sizeof(ac_uint4), data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1700:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((out = fopen(path, "wb")) == 0) data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1736:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. fwrite((char *) kdecomps[i].decomp, sizeof(ac_uint4), data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1780:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((out = fopen(path, "wb")) == 0) data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1854:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((out = fopen(path, "wb")) == 0) data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1926:27: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((in = fopen(argv[0], "r")) == 0) data/openldap-2.4.56+dfsg/libraries/liblunicode/ucdata/ucgendat.c:1942:23: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((in = fopen(argv[0], "r")) == 0) data/openldap-2.4.56+dfsg/libraries/liblunicode/ucstr.c:182:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, s, outpos); data/openldap-2.4.56+dfsg/libraries/liblutil/avl.c:188:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char pdir[MAX_TREE_DEPTH]; data/openldap-2.4.56+dfsg/libraries/liblutil/detach.c:93:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( (sd = open( "/dev/null", O_RDWR )) == -1 && data/openldap-2.4.56+dfsg/libraries/liblutil/detach.c:94:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). (sd = open( "/dev/null", O_RDONLY )) == -1 && data/openldap-2.4.56+dfsg/libraries/liblutil/detach.c:96:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). (sd = open( "/", O_RDONLY )) == -1 ) { data/openldap-2.4.56+dfsg/libraries/liblutil/detach.c:133:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( (sd = open( "/dev/tty", O_RDWR )) != -1 ) { data/openldap-2.4.56+dfsg/libraries/liblutil/entropy.c:59:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open( URANDOM_DEVICE, O_RDONLY ); data/openldap-2.4.56+dfsg/libraries/liblutil/entropy.c:140:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[16]; data/openldap-2.4.56+dfsg/libraries/liblutil/getopt.c:58:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ptr, outbuf[4096]; data/openldap-2.4.56+dfsg/libraries/liblutil/getpass.c:72:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char pbuf[PBUF]; data/openldap-2.4.56+dfsg/libraries/liblutil/getpass.c:90:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fi = fopen(TTY, "r")) == NULL) data/openldap-2.4.56+dfsg/libraries/liblutil/md5.c:309:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char checksum[LUTIL_MD5_BYTES]; data/openldap-2.4.56+dfsg/libraries/liblutil/meter.c:54:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( dest, "none" ); data/openldap-2.4.56+dfsg/libraries/liblutil/meter.c:281:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time_buffer[19]; data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:80:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char regpath[132]; data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:165:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:354:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[255]; data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:356:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char vValue[1024]; data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:389:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *Inserts[5]; data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:494:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char msgBuf[1024]; data/openldap-2.4.56+dfsg/libraries/liblutil/passfile.c:39:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *f = fopen( filename, "r" ); data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:57:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef unsigned char des_data_block[8]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:493:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SHA1digest[LUTIL_SHA1_BYTES]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:538:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SHA1digest[LUTIL_SHA1_BYTES]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:580:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char MD5digest[LUTIL_MD5_BYTES]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:625:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char MD5digest[LUTIL_MD5_BYTES]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:669:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key, keyData, 8); data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:823:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char k[8]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:845:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char UcasePassword[15]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:850:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char PasswordHash[33], storedPasswordHash[33]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:883:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( PasswordHash, "%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x", data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1033:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SHA1digest[LUTIL_SHA1_BYTES]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1034:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char saltdata[SALT_SIZE]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1064:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char SHA1digest[LUTIL_SHA1_BYTES]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1085:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char MD5digest[LUTIL_MD5_BYTES]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1086:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char saltdata[SALT_SIZE]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1116:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char MD5digest[LUTIL_MD5_BYTES]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1141:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char UcasePassword[15]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1146:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char PasswordHash[33]; data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1170:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( PasswordHash, "%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x", data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1190:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char salt[32]; /* salt suitable for most anything */ data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1217:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entropy[sizeof(salt)]; data/openldap-2.4.56+dfsg/libraries/liblutil/sasl.c:110:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input[1024]; data/openldap-2.4.56+dfsg/libraries/liblutil/setproctitle.c:52:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ 1024 ]; data/openldap-2.4.56+dfsg/libraries/liblutil/sha1.c:185:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char finalcount[8]; data/openldap-2.4.56+dfsg/libraries/liblutil/sha1.c:242:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[20]; data/openldap-2.4.56+dfsg/libraries/liblutil/sha1.c:260:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[BUFSIZ]; data/openldap-2.4.56+dfsg/libraries/liblutil/sha1.c:266:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(filename,O_RDONLY)) < 0) data/openldap-2.4.56+dfsg/libraries/liblutil/tavl.c:197:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char pdir[MAX_TREE_DEPTH]; data/openldap-2.4.56+dfsg/libraries/liblutil/testavl.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[ 10 ]; data/openldap-2.4.56+dfsg/libraries/liblutil/testavl.c:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ 80 ]; data/openldap-2.4.56+dfsg/libraries/liblutil/testtavl.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[ 10 ]; data/openldap-2.4.56+dfsg/libraries/liblutil/testtavl.c:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ 80 ]; data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:337:5: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). int mkstemp( char * template ) data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:340:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return open ( mktemp ( template ), O_RDWR|O_CREAT|O_EXCL, 0600 ); data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:389:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_PATH+1]; data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:393:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[32768]; data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:751:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tbuf[HEXMAX+1]; data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:762:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( tbuf, pin, chunk ); data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:782:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[64], *tmp; data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:786:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tbuf[DECMAX+1]; data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:811:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( tbuf, pin, chunk ); data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:65:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char zero[6]; data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:66:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char eaddr[6]; data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:116:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof(struct ifreq) * 32]; data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:428:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf1[8], buf2[64]; data/openldap-2.4.56+dfsg/libraries/librewrite/ldapmap.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *lm_attrs[ 2 ]; data/openldap-2.4.56+dfsg/libraries/librewrite/parse.c:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ 1024 ]; data/openldap-2.4.56+dfsg/libraries/librewrite/parse.c:96:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[11]; data/openldap-2.4.56+dfsg/libraries/librewrite/rewrite.c:149:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fin = fopen( optarg, "r" ); data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:137:28: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). map->lm_args = ( void * )fopen( filename, "r" ); data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:304:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:366:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filter[1024]; data/openldap-2.4.56+dfsg/servers/slapd/aci.c:401:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ ACI_BUF_SIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/aci.c:819:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char accessmaskbuf[ACCESSMASK_MAXLEN]; data/openldap-2.4.56+dfsg/servers/slapd/aci.c:820:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char accessmaskbuf1[ACCESSMASK_MAXLEN]; data/openldap-2.4.56+dfsg/servers/slapd/acl.c:149:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char accessmaskbuf[ACCESSMASK_MAXLEN]; data/openldap-2.4.56+dfsg/servers/slapd/acl.c:372:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char accessmaskbuf[ACCESSMASK_MAXLEN]; data/openldap-2.4.56+dfsg/servers/slapd/acl.c:856:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ACL_BUF_SIZE]; data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1127:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char accessmaskbuf[ACCESSMASK_MAXLEN]; data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1262:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ACL_BUF_SIZE]; data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1299:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ACL_BUF_SIZE]; data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1362:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ACL_BUF_SIZE]; data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1378:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[STRLENOF("255.255.255.255") + 1]; data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1423:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[STRLENOF("FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF") + 1]; data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1507:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ACL_BUF_SIZE]; data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1573:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ACL_BUF_SIZE]; data/openldap-2.4.56+dfsg/servers/slapd/acl.c:1657:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ACL_BUF_SIZE]; data/openldap-2.4.56+dfsg/servers/slapd/acl.c:2651:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newbuf[ACL_BUF_SIZE]; data/openldap-2.4.56+dfsg/servers/slapd/acl.c:2670:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[ACL_BUF_SIZE]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:127:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:167:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:213:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dnbuf[SLAP_LDAPDN_MAXLEN + 2]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:214:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rebuf[SLAP_LDAPDN_MAXLEN + 1]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:518:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:537:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err[SLAP_TEXT_BUFLEN], data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:577:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:593:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:608:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:649:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:696:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err[ SLAP_TEXT_BUFLEN ], data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:1064:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:1081:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:1233:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:1251:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:1279:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2592:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2606:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2625:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char maskbuf[ACCESSMASK_MAXLEN]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2724:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2730:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2736:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2742:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/ad.c:175:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tagbuf[MAX_TAGS_LEN]; data/openldap-2.4.56+dfsg/servers/slapd/ad.c:1143:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen( fname, "r" ); data/openldap-2.4.56+dfsg/servers/slapd/add.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/add.c:237:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/add.c:591:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/add.c:592:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/add.c:642:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuidbuf[ LDAP_LUTIL_UUIDSTR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/alock.c:250:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char slotbuf [ALOCK_SLOT_SIZE]; data/openldap-2.4.56+dfsg/servers/slapd/alock.c:298:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char slotbuf [ALOCK_SLOT_SIZE]; data/openldap-2.4.56+dfsg/servers/slapd/alock.c:415:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). info->al_fd = open (filename, O_CREAT|O_RDWR, 0666); data/openldap-2.4.56+dfsg/servers/slapd/at.c:987:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[32]; data/openldap-2.4.56+dfsg/servers/slapd/at.c:1027:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. idx.bv_len = sprintf(idx.bv_val, "{%d}", i); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/add.c:31:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/back-bdb.h:262:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ((db)->open)(db, file, name, type, flags, mode) data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/back-bdb.h:293:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ((db)->open)(db, NULL, file, name, type, flags, mode) data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:343:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *f = fopen( bdb->bi_db_config_path, "w" ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:383:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:396:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:442:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:443:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *f = fopen( bdb->bi_db_config_path, "r" ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:513:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:781:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen( bdb->bi_db_config_path, "a" ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:818:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( ptr, "DUMMY" ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:819:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen( testpath, "w" ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:843:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( ptr, "DB_CONFIG" ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:845:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen( bdb->bi_db_config_path, "r" ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:919:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). s = atoi(c->argv[2]); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/delete.c:104:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csnbuf[LDAP_PVT_CSNSTR_BUFSIZE]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:66:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:412:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char nrdnlen[2]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:413:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nrdn[1]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:414:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rdn[1]; /* variable placement */ data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:415:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char entryID[sizeof(ID)]; /* variable placement */ data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:615:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char dlen[2]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:639:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( d->nrdn, BEI(e)->bei_nrdn.bv_val, BEI(e)->bei_nrdn.bv_len+1 ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/dn2id.c:711:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char dlen[2]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/error.c:56:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char msg[1024]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/id2entry.c:104:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/idl.c:284:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( buf, "[%02x%02x%02x%02x]", c[0], c[1], c[2], c[3] ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/idl.c:545:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keybuf[16]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/idl.c:708:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/idl.c:919:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c:109:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAXPATHLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c:184:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( ptr, "__db.001" ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c:330:23: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). rc = (bdb->bi_dbenv->open)( bdb->bi_dbenv, dbhome, data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/init.c:774:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char v2[1024]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/modify.c:452:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/modrdn.c:36:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c:153:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ ]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c:244:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[ 3 ]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c:398:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[ MAXPATHLEN ] = { '\0' }; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c:646:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char count_buf[ BDB_MONITOR_IDX_TYPES ][ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/nextid.c:40:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char idbuf[sizeof(ID)]; data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/tools.c:31:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ehbuf[16]; data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/referral.c:99:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( url.bv_val, "ldap://" ); data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/search.c:108:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( url.bv_val, "ldap://" ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/bind.c:65:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/bind.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[ sizeof("BAPTIENSC") ]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/bind.c:1099:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/bind.c:1168:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/bind.c:2992:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tbuf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:615:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ * 2 ], data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:954:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[ 3 ]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1060:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1282:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1294:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1306:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:1396:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[AC_LINE_MAX]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:410:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[INET6_ADDRSTRLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:412:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char peername[MAXPATHLEN + sizeof("PATH=")]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:414:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char peername[sizeof("IP=[ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]:65535")]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:416:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char peername[sizeof("IP=255.255.255.255:65336")]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:485:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:841:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[ 3 ]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/search.c:934:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *attr[3], **attrp = NULL; data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:428:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open( path, O_RDONLY ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:508:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[sizeof(HEADER "# CRC32 12345678\n")]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:560:31: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). fd = tmpfname == NULL ? -1 : mkstemp( tmpfname ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:1394:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:1440:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:1478:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csnbuf[LDAP_PVT_CSNSTR_BUFSIZE]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:1606:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[128]; data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:1631:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/add.c:30:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/back-mdb.h:197:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pad[(sizeof(IndexRbody)+CACHELINE-1) & (!CACHELINE-1)]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/config.c:281:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/config.c:294:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/config.c:572:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( ptr, "DUMMY" ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/config.c:573:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen( testpath, "w" ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/delete.c:109:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csnbuf[LDAP_PVT_CSNSTR_BUFSIZE]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:46:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char nrdnlen[2]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nrdn[1]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rdn[1]; /* variable placement */ data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:49:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char entryID[sizeof(ID)]; /* variable placement */ data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:117:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ptr, &e->e_id, sizeof( ID )); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:119:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ptr, &nsubs, sizeof( ID )); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:150:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ptr, &pid, sizeof( ID )); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:169:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &nid, ptr, sizeof( ID )); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:174:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( p2, data.mv_data, rlen+2 ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:182:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &subs, ptr, sizeof( ID )); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:185:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( p2, data.mv_data, data.mv_size - sizeof( ID )); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:186:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( p2+data.mv_size - sizeof( ID ), &subs, sizeof( ID )); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:228:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &nid, key.mv_data, sizeof( ID )); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:250:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &nid, ptr, sizeof( ID )); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:255:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( p2, data.mv_data, rlen+2 ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:263:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &subs, ptr, sizeof( ID )); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:266:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( p2, data.mv_data, data.mv_size - sizeof( ID )); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:267:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( p2+data.mv_size - sizeof( ID ), &subs, sizeof( ID )); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:306:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dn[SLAP_LDAPDN_MAXLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:368:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &nid, ptr, sizeof(ID)); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:403:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( nsubs, ptr, sizeof( ID )); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:491:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &nid, ptr, sizeof(ID)); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:564:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dn[SLAP_LDAPDN_MAXLEN], ndn[SLAP_LDAPDN_MAXLEN], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:589:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &id, ptr, sizeof(ID) ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:599:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( nptr, d->nrdn, nrlen+1 ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:600:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( dptr, d->nrdn+nrlen+1, rlen+1 ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:609:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( name->bv_val, dn, name->bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:611:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( nname->bv_val, ndn, nname->bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:679:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &id, ptr, sizeof(ID) ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:774:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &id, ptr, sizeof(ID) ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:839:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &id, ptr, sizeof(ID) ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:884:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &isc->id, ptr, sizeof(ID)); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:889:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &nsubs, ptr, sizeof(ID)); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/dn2id.c:968:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ptr, data.mv_data, nrlen+2 ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/id2entry.c:635:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, a->a_vals[i].bv_val, data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/id2entry.c:643:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, a->a_nvals[i].bv_val, data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:254:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( buf, "[%02x%02x%02x%02x]", c[0], c[1], c[2], c[3] ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:278:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keybuf[16]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:338:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( i, data.mv_data, data.mv_size ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:410:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:430:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key.mv_data, keys[k].bv_val, keys[k].bv_len); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:441:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&lo, data.mv_data, sizeof(ID)); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:569:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:588:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key.mv_data, keys[k].bv_val, keys[k].bv_len); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/idl.c:598:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &tmp, data.mv_data, sizeof(ID) ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/init.c:414:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char v2[1024]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/key.c:53:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(kbuf, k->bv_val, k->bv_len); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/modify.c:451:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/modrdn.c:35:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c:180:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ ]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c:273:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c:313:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[ 3 ]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c:481:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[ MAXPATHLEN ] = { '\0' }; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c:729:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char count_buf[ MDB_MONITOR_IDX_TYPES ][ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:286:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( cursor, key.mv_data, sizeof(ID)); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:354:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &ww->key, key.mv_data, sizeof(ID) ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:357:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ww->data.mv_data, data.mv_data, data.mv_size); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:1008:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, isc.rdns[i].bv_val, isc.rdns[i].bv_len); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:1011:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(n, isc.nrdns[i].bv_val, isc.nrdns[i].bv_len); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:1018:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, isc.rdns[i].bv_val, isc.rdns[i].bv_len); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:1021:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(n, isc.nrdns[i].bv_val, isc.nrdns[i].bv_len); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:1028:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, pdn.bv_val, pdn.bv_len+1); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/search.c:1029:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(n, pndn.bv_val, pndn.bv_len+1); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/tools.c:1238:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ic->kstr.bv_val, itmp.kstr.bv_val, ic->kstr.bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/tools.c:1323:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rdn[512]; data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/tools.c:1402:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&id, ptr, sizeof(ID)); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/tools.c:1404:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stack[depth].rdn, data.mv_data, data.mv_size); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/tools.c:1428:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, &num[depth], sizeof(ID)); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/bind.c:98:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/bind.c:319:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/bind.c:701:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[STRLENOF("4294967295U") + 1] = { 0 }; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/bind.c:766:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/bind.c:841:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[STRLENOF("4294967295U") + 1] = { 0 }; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/bind.c:1193:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/candidates.c:257:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:535:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *rargv[ 3 ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:677:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[32], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:907:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char regerr[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1163:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1177:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1189:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1437:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1653:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[AC_LINE_MAX]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:2198:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char regerr[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:2560:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char binddn[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:2795:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[5]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:3294:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *rargv[ 5 ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c:303:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c:728:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c:1234:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[STRLENOF("4294967295U") + 1] = { 0 }; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c:1726:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[STRLENOF("4294967295U") + 1] = { 0 }; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c:1747:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[STRLENOF("4294967295U") + 1] = { 0 }; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c:1757:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[STRLENOF("4294967295U") + 1] = { 0 }; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/conn.c:1868:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/init.c:242:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:105:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ] = { '\0' }; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:126:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ] = { '\0' }; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:141:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:263:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:297:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:939:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cnd[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:1133:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:1397:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:1759:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:1858:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. free( (char *)candidates[ i ].sr_matched ); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:1884:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. free( (char *)candidates[ i ].sr_matched ); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:1984:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. free( (char *)candidates[ i ].sr_matched ); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:1989:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ldap_memfree( (char *)candidates[ i ].sr_text ); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:2153:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/search.c:2371:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/backend.c:74:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BACKMONITOR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/backend.c:118:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_LDAPDN_MAXLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/conn.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BACKMONITOR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/conn.c:239:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[LDAP_PVT_INTTYPE_CHARS(long)]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/conn.c:270:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BACKMONITOR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/conn.c:271:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf2[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/conn.c:272:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf3[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/database.c:112:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BACKMONITOR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/database.c:208:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BACKMONITOR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/database.c:392:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BACKMONITOR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/database.c:589:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BACKMONITOR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/database.c:995:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BACKMONITOR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:995:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:1043:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:1451:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:1502:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:1553:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2017:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[ 3 ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2041:34: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((AttributeDescription **)&(((char *)mi)[ mat[ i ].offset ])); data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2057:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((ObjectClass **)&(((char *)mi)[ moc[ i ].offset ])); data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2254:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tmbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2358:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( dn.bv_val, "cn=" ); data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/listener.c:70:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BACKMONITOR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/log.c:174:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char textbuf[ BACKMONITOR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/overlay.c:72:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BACKMONITOR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/overlay.c:100:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_LDAPDN_MAXLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/rww.c:165:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[LDAP_PVT_INTTYPE_CHARS(long)]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/thread.c:132:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[ BACKMONITOR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/thread.c:228:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BACKMONITOR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/time.c:199:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/time.c:224:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BACKMONITOR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/add.cpp:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/back-ndb.h:140:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nr_buf[NDB_MAX_RDNS][NDB_RDN_LEN+1]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/config.cpp:140:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/config.cpp:239:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ai->na_len = atoi( c->argv[2] ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/delete.cpp:61:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csnbuf[LDAP_PVT_CSNSTR_BUFSIZE]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/init.cpp:103:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sqlbuf[BUFSIZ], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/init.cpp:171:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. ptr += sprintf( ptr, "CREATE TABLE IF NOT EXISTS " DN2ID_TABLE " (" data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/init.cpp:217:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( ptr, ") ENGINE=ndb" ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/modify.cpp:469:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/modrdn.cpp:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:193:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:473:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:546:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[65538], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:670:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ptr, an[j]->a_vals[i].bv_val, an[j]->a_vals[i].bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:795:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char abuf[65536], *ptr, **attrs = NULL; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:896:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. buf = (unsigned char *)attrs[k]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:933:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. buf = (unsigned char *)attrs[k++]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1102:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( rdns->nr_buf[i]+1, beg, len ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1124:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dummy[2] = {0,0}; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1186:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ptr, buf[sizeof(MedVar)]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1225:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ptr, buf[sizeof(MedVar)]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1237:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ptr, a->a_vals[0].bv_val, len ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1334:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char idbuf[NDB_MAX_RDNS][2*sizeof(ID)]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1335:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ocbuf[NDB_MAX_RDNS][NDB_OC_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1394:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dummy[2] = {0,0}; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:196:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ptr, f->f_av_value.bv_val, f->f_av_value.bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:240:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ptr, f->f_sub_initial.bv_val, f->f_sub_initial.bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:249:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ptr, f->f_sub_any[i].bv_val, f->f_sub_any[i].bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:257:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ptr, f->f_sub_final.bv_val, f->f_sub_final.bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:283:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dnBuf[2048], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:286:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char idbuf[2*sizeof(ID)]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:287:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ocbuf[NDB_OC_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:450:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xbuf[512]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:512:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dnBuf[2048], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:513:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char idbuf[2*sizeof(ID)]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:514:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ocbuf[NDB_OC_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:760:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char idbuf[2*sizeof(ID)]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp:48:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char myDNbuf[2048]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp:49:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char myIdbuf[2*sizeof(ID)]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp:50:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char myOcbuf[NDB_OC_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp:76:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp:188:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/tools.cpp:236:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c:339:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/openldap-2.4.56+dfsg/servers/slapd/back-perl/config.c:119:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char eval_str[EVAL_BUF_SIZE]; data/openldap-2.4.56+dfsg/servers/slapd/back-shell/result.c:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[BUFSIZ]; data/openldap-2.4.56+dfsg/servers/slapd/back-shell/result.c:52:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[128]; data/openldap-2.4.56+dfsg/servers/slapd/back-sock/opensock.c:55:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sockun.sun_path, "%.*s", (int)(sizeof(sockun.sun_path)-1), data/openldap-2.4.56+dfsg/servers/slapd/back-sock/result.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[BUFSIZ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sock/result.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[128]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:784:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char logbuf[ STRLENOF("val[], id=") + 2*LDAP_PVT_INTTYPE_CHARS(unsigned long)]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:923:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:931:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ LDAP_PVT_CSNSTR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:952:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ] = { '\0' }; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:987:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:1392:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/config.c:351:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ*2], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/config.c:646:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/entry-id.c:128:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char upperdn[ BACKSQL_MAX_DN_LEN + 1 ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/entry-id.c:267:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/entry-id.c:789:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/entry-id.c:824:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/entry-id.c:1040:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ 1024 ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/init.c:280:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/modify.c:138:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ] = { '\0' }; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/modrdn.c:395:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ] = { '\0' }; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/operational.c:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/rdbms_depend/timesten/dnreverse/dnreverse.cpp:107:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dn_rn[512]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/rdbms_depend/timesten/dnreverse/dnreverse.cpp:165:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oDn[512]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c:197:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[LDAP_PVT_INTTYPE_CHARS(long)]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c:236:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[STRLENOF("INSERT INTO ldap_entry_objclasses " data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c:252:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[STRLENOF("DELETE FROM ldap_entry_objclasses " data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c:373:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c:411:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/schema-map.c:593:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/search.c:881:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyvalbuf[LDAP_PVT_INTTYPE_CHARS(unsigned long)]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/search.c:1588:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lowidstring[48]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/search.c:1668:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_base_ndn[ BACKSQL_MAX_DN_LEN + 1 + 1 ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/sql-wrap.c:70:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char drv_name[ 30 ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/sql-wrap.c:386:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char DBMSName[ 32 ]; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:161:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *cstr, cc[ 2 ] = { '\0', '\0' }; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:490:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuidbuf[ LDAP_LUTIL_UUIDSTR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/backend.c:971:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *oids[ 2 ]; data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:942:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096*3]; data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1056:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *src, *dst, ibuf[11]; data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1111:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[5]; data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1113:19: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. bv.bv_len = sprintf( buf, "%d", si->si_num ); data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1201:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[32]; data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1950:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). logfile = fopen(logfileName, "w"); data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:2286:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8192]; data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:2375:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8192]; data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:2669:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof("2147483648")], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:2877:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ] = { '\0' }; data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:3572:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char numbuf[32]; data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:4025:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[3]; data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:4583:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[32], *ptr1, *ptr2 = NULL; data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:5063:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:5429:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:5586:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( ca->log, "back-config" ); data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:7412:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[4]; data/openldap-2.4.56+dfsg/servers/slapd/component.c:657:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1][128]; data/openldap-2.4.56+dfsg/servers/slapd/component.c:672:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( cav.cav_buf+1, cr_ptr, cr_len ); data/openldap-2.4.56+dfsg/servers/slapd/config.c:718:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( c, cf, sizeof( ConfigArgs ) ); data/openldap-2.4.56+dfsg/servers/slapd/config.c:749:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen( fname, "r" ); data/openldap-2.4.56+dfsg/servers/slapd/config.c:1559:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[AC_LINE_MAX], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/config.c:1686:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/openldap-2.4.56+dfsg/servers/slapd/config.c:2216:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[AC_LINE_MAX]; data/openldap-2.4.56+dfsg/servers/slapd/config.h:126:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/config.h:137:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char log[MAXPATHLEN + STRLENOF(": line ") + LDAP_PVT_INTTYPE_CHARS(unsigned long)]; data/openldap-2.4.56+dfsg/servers/slapd/connection.c:1540:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char peername[sizeof("IP=[ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]:65535")]; data/openldap-2.4.56+dfsg/servers/slapd/connection.c:1541:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[INET6_ADDRSTRLEN]; data/openldap-2.4.56+dfsg/servers/slapd/connection.c:1543:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char peername[sizeof("IP=255.255.255.255:65336")]; data/openldap-2.4.56+dfsg/servers/slapd/connection.c:1544:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[INET_ADDRSTRLEN]; data/openldap-2.4.56+dfsg/servers/slapd/controls.c:99:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *slap_known_controls[SLAP_MAX_CIDS+1]; data/openldap-2.4.56+dfsg/servers/slapd/controls.c:952:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *oids[ 2 ]; data/openldap-2.4.56+dfsg/servers/slapd/cr.c:417:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[32]; data/openldap-2.4.56+dfsg/servers/slapd/cr.c:454:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. idx.bv_len = sprintf(idx.bv_val, "{%d}", i); data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:451:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). slap_daemon[t].sd_dpfd = open( SLAP_EVENT_FNAME, O_RDWR ); \ data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:707:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. slapd_srvurls[i] = (char *) ch_realloc( slapd_srvurls[i], data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:713:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. slapd_srvurls[i] = (char *) ch_realloc( slapd_srvurls[i], data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1217:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serv[7]; data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1596:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[INET_ADDRSTRLEN]; data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1615:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[INET6_ADDRSTRLEN]; data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1865:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hbuf[NI_MAXHOST]; data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1871:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[INET6_ADDRSTRLEN]; data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1873:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char peername[MAXPATHLEN + sizeof("PATH=")]; data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1875:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char peerbuf[8]; data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1879:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char peername[sizeof("IP=[ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]:65535")]; data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1881:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char peername[sizeof("IP=255.255.255.255:65336")]; data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2032:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. authid.bv_len = sprintf( authid.bv_val, data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2226:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2652:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[BUFSIZ]; data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:2827:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[BUFSIZ]; data/openldap-2.4.56+dfsg/servers/slapd/ldapsync.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cookiestr[ LDAP_PVT_CSNSTR_BUFSIZE + 20 ]; data/openldap-2.4.56+dfsg/servers/slapd/ldapsync.c:56:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len += sprintf( cookiestr+len, ",sid=%03x", sid ); data/openldap-2.4.56+dfsg/servers/slapd/ldapsync.c:75:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. len = sprintf( cookie->bv_val, "rid=%03d,", rid ); data/openldap-2.4.56+dfsg/servers/slapd/ldapsync.c:78:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. ptr += sprintf( ptr, "sid=%03x,", sid ); data/openldap-2.4.56+dfsg/servers/slapd/ldapsync.c:394:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE + 4 ]; data/openldap-2.4.56+dfsg/servers/slapd/limits.c:44:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *const dn_source[2] = { "DN", "DN.THIS" }; data/openldap-2.4.56+dfsg/servers/slapd/lock.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/openldap-2.4.56+dfsg/servers/slapd/lock.c:52:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( (*lfp = fopen( buf, "w" )) == NULL ) { data/openldap-2.4.56+dfsg/servers/slapd/lock.c:62:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( (fp = fopen( fname, type )) == NULL ) { data/openldap-2.4.56+dfsg/servers/slapd/main.c:396:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if( ( leakfile = fopen( "slapd.leak", "w" )) == NULL ) { data/openldap-2.4.56+dfsg/servers/slapd/main.c:933:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/openldap-2.4.56+dfsg/servers/slapd/main.c:950:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen( slapd_pid_file, "w" ); data/openldap-2.4.56+dfsg/servers/slapd/main.c:972:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen( slapd_args_file, "w" ); data/openldap-2.4.56+dfsg/servers/slapd/modify.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/modify.c:134:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char abuf[BUFSIZ/2], *ptr = abuf; data/openldap-2.4.56+dfsg/servers/slapd/modify.c:198:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/modify.c:870:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/modify.c:871:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/mods.c:413:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[sizeof(long)*3 + 2]; /* overly long */ data/openldap-2.4.56+dfsg/servers/slapd/module.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1]; data/openldap-2.4.56+dfsg/servers/slapd/module.c:55:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ebuf[BUFSIZ]; data/openldap-2.4.56+dfsg/servers/slapd/nt_svc.c:31:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_PATH], *fname_start; data/openldap-2.4.56+dfsg/servers/slapd/nt_svc.c:68:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(filename, " service"); data/openldap-2.4.56+dfsg/servers/slapd/oc.c:829:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[32]; data/openldap-2.4.56+dfsg/servers/slapd/oc.c:866:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. idx.bv_len = sprintf(idx.bv_val, "{%d}", i); data/openldap-2.4.56+dfsg/servers/slapd/oidm.c:176:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[32], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/oidm.c:203:18: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. idx.bv_len = sprintf(idx.bv_val, "{%d}", i ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:507:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). t2 = atoi( agestr ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:522:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). t2 = atoi( agestr ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:535:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). t1 += atoi( agestr ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:644:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[LDAP_LUTIL_GENTIME_BUFSIZE]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:645:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csnbuf[LDAP_PVT_CSNSTR_BUFSIZE]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:753:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char agebuf[2*STRLENOF("ddddd+hh:mm:ss ")]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1226:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ptr, data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1297:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rdnbuf[STRLENOF(RDNEQ)+LDAP_LUTIL_GENTIME_BUFSIZE+8]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1298:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nrdnbuf[STRLENOF(RDNEQ)+LDAP_LUTIL_GENTIME_BUFSIZE+8]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1463:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[LDAP_LUTIL_GENTIME_BUFSIZE+8]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:1859:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cbuf[LDAP_PVT_CSNSTR_BUFSIZE]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:2048:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:2441:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( normalized->bv_val, "%02d%02d%02d%02d%02d%02d%02d", data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:2445:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( normalized->bv_val + STRLENOF("YYYYmmddHHMMSSZ")-1, data/openldap-2.4.56+dfsg/servers/slapd/overlays/auditlog.c:124:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((f = fopen(ad->ad_logfile, "a")) == NULL) { data/openldap-2.4.56+dfsg/servers/slapd/overlays/collect.c:320:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errMsg[100]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/constraint.c:155:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char val_buf[SLAP_TEXT_BUFLEN] = { '\0' }; data/openldap-2.4.56+dfsg/servers/slapd/overlays/constraint.c:306:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errmsg[1024]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/constraint.c:1068:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:132:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tsbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:397:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ttlbuf[STRLENOF("31557600") + 1]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:398:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tsbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:503:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:799:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tsbuf[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:897:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ttlbuf[STRLENOF("31557600") + 1]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:1080:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ttlbuf[STRLENOF("31557600") + 1]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/dds.c:1329:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:199:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[1024]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/dynlist.c:299:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[1024]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/memberof.c:439:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/memberof.c:481:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/memberof.c:1870:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:360:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char attrset_buf[ LDAP_PVT_INTTYPE_CHARS( unsigned long ) ], data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:376:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. attrset_len = sprintf( attrset_buf, data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:378:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. expiry_len = sprintf( expiry_buf, data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:383:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. refresh_len = sprintf( refresh_buf, data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:845:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:1626:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( qbase->base.bv_val, qb.base.bv_val, qb.base.bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:1798:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filter_str[ LDAP_LUTIL_UUIDSTR_BUFSIZE + STRLENOF( "(pcacheQueryID=)" ) ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:1974:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( fstr->bv_val, "(?=)" ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:2098:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filtbuf[ LDAP_LUTIL_UUIDSTR_BUFSIZE + STRLENOF( "(entryUUID=)" ) ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:2214:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filter_str[ LDAP_LUTIL_UUIDSTR_BUFSIZE + STRLENOF( "(pcacheQueryID=)" ) ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:2306:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuidbuf[ LDAP_LUTIL_UUIDSTR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:3310:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:3405:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filter_str[ LDAP_LUTIL_UUIDSTR_BUFSIZE + STRLENOF( "(pcacheQueryID=)" ) ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:5133:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuidbuf[ LDAP_LUTIL_UUIDSTR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:5212:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:5417:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:5457:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:5674:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[ 4 ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pwdCheckModule[MODULE_NAME_SZ]; /* name of module to dynamically data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:454:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof("-2147483648")]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:886:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[ MAX_PWD_HISTORY_SZ ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:991:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nowstr[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:992:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nowstr_usec[ LDAP_LUTIL_GENTIME_BUFSIZE+8 ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:1637:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:2120:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/retcode.c:862:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/retcode.c:1269:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.c:1439:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.c:1973:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[32], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.c:2062:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *rargv[ 3 ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.c:2228:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[5]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.c:2479:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[5]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmconf.c:187:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix[1024]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmconf.c:211:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix[1024]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmconf.c:326:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *rargv[ 5 ]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:651:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[LDAP_PVT_CSNSTR_BUFSIZE + STRLENOF("(entryCSN<=)")]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:652:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cbuf[LDAP_PVT_CSNSTR_BUFSIZE]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:1103:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ri->ri_csn.bv_val, csn.bv_val, csn.bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:1123:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ri->ri_csn.bv_val, csn.bv_val, csn.bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:1567:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txtbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:1635:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuidstr[40] = {}; data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:1711:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cbuf[LDAP_PVT_CSNSTR_BUFSIZE]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:1802:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuidstr[40] = {}; data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:1974:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cbuf[LDAP_PVT_CSNSTR_BUFSIZE]; data/openldap-2.4.56+dfsg/servers/slapd/overlays/syncprov.c:3365:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/passwd.c:583:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. hash = (char *)defhash[0]; data/openldap-2.4.56+dfsg/servers/slapd/phonetic.c:117:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char phoneme[MAXPHONEMELEN + 1]; data/openldap-2.4.56+dfsg/servers/slapd/phonetic.c:199:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char vsvfn[26] = { data/openldap-2.4.56+dfsg/servers/slapd/phonetic.c:217:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ntrans[40]; /* word with uppercase letters */ data/openldap-2.4.56+dfsg/servers/slapd/phonetic.c:219:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPHONEMELEN + 2]; data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:2180:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[LDAP_PVT_INTTYPE_CHARS(long)]; \ data/openldap-2.4.56+dfsg/servers/slapd/result.c:85:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( v2+len, "Referral:" ); data/openldap-2.4.56+dfsg/servers/slapd/result.c:148:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). no_assert = rs_suppress_assert = atoi( s ); data/openldap-2.4.56+dfsg/servers/slapd/root_dse.c:327:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof("255")]; data/openldap-2.4.56+dfsg/servers/slapd/root_dse.c:497:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *attrs[ 2 ] = { NULL, NULL }; data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:451:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:476:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. op.o_req_ndn.bv_val = (char *)pr[i].values[0]; data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:597:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *names[2]; data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:743:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. authcDN.bv_val = auxvals[1].values ? (char *)auxvals[1].values[0] : NULL; data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:752:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. authzDN.bv_val = auxvals[3].values ? (char *)auxvals[3].values[0] : NULL; data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:306:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_LDAPDN_MAXLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:614:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_LDAPDN_MAXLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1044:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ SLAP_LDAPDN_MAXLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1426:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[32], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1435:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. idx.bv_len = sprintf( idx.bv_val, "{%d}", i); data/openldap-2.4.56+dfsg/servers/slapd/schema.c:120:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:432:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tubuf[STRLENOF("YYYYmmddHHMMSSZ") + 1]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:646:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char HASHdigest[HASH_BYTES]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:666:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (unsigned char *)values[i].bv_val, values[i].bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:691:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char HASHdigest[HASH_BYTES]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:855:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char HASHdigest[HASH_BYTES]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:934:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (unsigned char *)values[i].bv_val, j ); data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:976:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char HASHdigest[HASH_BYTES]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:1368:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( out->bv_val + out->bv_len, uidval.bv_val, uidval.bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2533:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char lenbuf[sizeof(k) + 2], *lenp, neg = 0xff; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2575:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( key->bv_val, lenp, k ); data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2578:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( key->bv_val + k, itmp.bv_val, itmp.bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2595:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[64]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2663:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[64]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:3507:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( sptr, "%01X", ( ptr[0] & 0x0fU ) ); data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:3512:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( sptr, "%02X", ptr[i] ); data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:3544:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf2[SLAP_SN_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:3545:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf3[SLAP_SN_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:3633:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serialbuf2[SLAP_SN_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:3720:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[STRLENOF("YYYYmmddHHMMSSZ") + 1]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:4056:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[STRLENOF("YYYYmmddHHMMSSZ") + 1]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:4128:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *p, tubuf[STRLENOF("YYYYmmddHHMMSSZ") + 1]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:4668:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf2[SLAP_SN_BUFLEN], i_sbuf2[SLAP_SN_BUFLEN], data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:4792:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char issuer_serialbuf[SLAP_SN_BUFLEN], serialbuf[SLAP_SN_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5006:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ptr, data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ STRLENOF( "YYYYmmddHHMMSS.uuuuuuZ#SSSSSS#SID#ssssss" ) + 1 ]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5260:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ STRLENOF( "YYYYmmddHHMMSS.uuuuuuZ#SSSSSS#SID#ssssss" ) + 1 ]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5642:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( normalized->bv_val, "%02d%02d%02d%02d%02d%02dZ", data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5696:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( normalized->bv_val, "%02d%02d%02d%02d%02d%02d%02d", data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5700:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( normalized->bv_val + STRLENOF("YYYYmmddHHMMSSZ")-1, data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5749:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[5]; data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5804:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[5]; data/openldap-2.4.56+dfsg/servers/slapd/search.c:212:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char abuf[BUFSIZ/2], *ptr = abuf; data/openldap-2.4.56+dfsg/servers/slapd/search.c:215:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(abuf, "scope=%d deref=%d", op->ors_scope, op->ors_deref); data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/passwd-shell.c:51:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tmpbuf[ MAXLINELEN * 2 ]; data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.c:154:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *p, *args, line[ MAXLINELEN + 1 ]; data/openldap-2.4.56+dfsg/servers/slapd/slap.h:1834:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char be_ctrls[SLAP_MAX_CIDS + 1]; data/openldap-2.4.56+dfsg/servers/slapd/slap.h:2342:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bi_ctrls[SLAP_MAX_CIDS + 1]; data/openldap-2.4.56+dfsg/servers/slapd/slap.h:2453:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ga_ndn[1]; data/openldap-2.4.56+dfsg/servers/slapd/slap.h:2542:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oh_log_prefix[ /* sizeof("conn= op=") + 2*LDAP_PVT_INTTYPE_CHARS(unsigned long) */ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/slap.h:2693:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char o_ctrlflag[SLAP_MAX_CIDS]; /* per-control flags */ data/openldap-2.4.56+dfsg/servers/slapd/slapacl.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char accessmaskbuf[ACCESSMASK_MAXLEN]; data/openldap-2.4.56+dfsg/servers/slapd/slapacl.c:304:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char accessmaskbuf[ACCESSMASK_MAXLEN]; data/openldap-2.4.56+dfsg/servers/slapd/slapadd.c:59:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char csnbuf[ LDAP_PVT_CSNSTR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/slapadd.c:100:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN] = { '\0' }; data/openldap-2.4.56+dfsg/servers/slapd/slapadd.c:207:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uuidbuf[ LDAP_LUTIL_UUIDSTR_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/slapadd.c:214:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timebuf[ LDAP_LUTIL_GENTIME_BUFSIZE ]; data/openldap-2.4.56+dfsg/servers/slapd/slapadd.c:293:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/slapadd.c:354:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN] = { '\0' }; data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.c:300:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if( ( leakfile = fopen( leakfilename, "w" )) == NULL ) { data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.h:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tv_maxcsnbuf[ LDAP_PVT_CSNSTR_BUFSIZE * ( SLAP_SYNC_SID_MAX + 1 ) ]; data/openldap-2.4.56+dfsg/servers/slapd/slapi/plugin.c:714:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char **argv, ibuf[32], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/slapi/printmsg.c:52:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timeStr[100]; data/openldap-2.4.56+dfsg/servers/slapd/slapi/printmsg.c:63:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen( slapi_log_file, "a" ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi.h:137:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pb_textbuf[ SLAP_TEXT_BUFLEN ]; data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:435:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:444:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:453:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:462:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:543:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:605:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:1866:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s, pb->pb_conn->c_peer_name.bv_val, pb->pb_conn->c_peer_name.bv_len); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2415:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2722:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:3150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN] = { '\0' }; data/openldap-2.4.56+dfsg/servers/slapd/slapschema.c:110:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char textbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/slaptest.c:65:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen( fname, "w" ); data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:88:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char si_ridtxt[ STRLENOF("rid=999") + 1 ]; data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:419:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char **attrs, *lattrs[9]; data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:1016:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char empty[6] = "empty"; data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:2445:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txtbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:2752:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txtbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:2997:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&s, syncUUID->bv_val, 2); data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:2998:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(val, syncUUID->bv_val+2, UUIDLEN-2); data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:3034:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&s, val->bv_val, 2); data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:3070:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&s, val->bv_val, 2); data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:4185:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txtbuf[SLAP_TEXT_BUFLEN]; data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5007:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( vnc, "(.*)" ); data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5012:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( rnc, "%1" ); data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5631:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( c->cr_msg, "rootDN must be defined before syncrepl may be used" ); data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5785:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ*2], *ptr; data/openldap-2.4.56+dfsg/servers/slapd/syntax.c:415:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ibuf[32]; data/openldap-2.4.56+dfsg/servers/slapd/syntax.c:444:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. idx.bv_len = sprintf(idx.bv_val, "{%d}", i); data/openldap-2.4.56+dfsg/servers/slapd/value.c:268:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ptr, ibuf[64]; /* many digits */ data/openldap-2.4.56+dfsg/servers/slapd/value.c:275:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. ibv.bv_len = sprintf(ibv.bv_val, "{%u}", i); data/openldap-2.4.56+dfsg/servers/slapd/zn_malloc.c:137:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). zh->zh_fd = open("/dev/zero", O_RDWR); data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:91:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( (s)->val + slen, data, sz * ((count) + !!(isString)) ); \ data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:161:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/openldap-2.4.56+dfsg/tests/progs/slapd-addel.c:273:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( (fp = fopen( filename, "r" )) != NULL ) { data/openldap-2.4.56+dfsg/tests/progs/slapd-addel.c:274:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-common.c:38:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char progname[ BUFSIZ ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-common.c:212:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char uribuf[ BUFSIZ ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-common.c:288:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-modify.c:208:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *values[2]; data/openldap-2.4.56+dfsg/tests/progs/slapd-modrdn.c:187:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *DNs[2]; data/openldap-2.4.56+dfsg/tests/progs/slapd-modrdn.c:188:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *rdns[2]; data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:113:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char thrstr[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:122:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char thrstr[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char thrstr[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:178:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outstr[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:406:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char thrstr[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:468:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char thrstr[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:469:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dn[256], uids[32], cns[32], *base; data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:581:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char thrstr[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:636:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *attrs[ 2 ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:641:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char thrstr[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:717:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char thrstr[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:718:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:752:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:787:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char thrstr[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:814:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-read.c:246:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *attrs[ 2 ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-read.c:418:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-read.c:526:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-search.c:272:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *attrs[ 2 ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-search.c:357:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-search.c:394:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ BUFSIZ ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:79:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char argbuf[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:139:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *sreqs[MAXREQS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:140:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *sattrs[MAXREQS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:141:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *sbase[MAXREQS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:144:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *sargs[MAXARGS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:147:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scmd[MAXPATHLEN]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:149:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char swampopt[sizeof("-SSS")]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:151:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char sloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:154:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *rreqs[MAXREQS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:156:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *rargs[MAXARGS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:157:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *rflts[MAXREQS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:160:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rcmd[MAXPATHLEN]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:161:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char rloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:163:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *afiles[MAXREQS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:165:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *aargs[MAXARGS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:167:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char acmd[MAXPATHLEN]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:168:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char aloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:171:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *nreqs[MAXREQS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:173:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *nargs[MAXARGS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:175:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ncmd[MAXPATHLEN]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:176:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char nloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *mreqs[MAXREQS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:180:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *mdn[MAXREQS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:182:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *margs[MAXARGS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mcmd[MAXPATHLEN]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:185:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char mloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:188:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *breqs[MAXREQS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:189:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *bcreds[MAXREQS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:190:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *battrs[MAXREQS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:192:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *bargs[MAXARGS]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:194:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bcmd[MAXPATHLEN]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:195:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char bloops[LDAP_PVT_INTTYPE_CHARS(unsigned long)]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:836:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. sargs[sanum - 5] = (char *)ldap_pvt_scope2str( slud[jj]->lud_scope ); data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:952:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:966:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( (fp = fopen( filename, "r" )) != NULL ) { data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:967:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:1036:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( (fp = fopen( filename, "r" )) != NULL ) { data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:1037:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[BUFSIZ]; data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:1099:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. { char *arg2[MAXREQS]; data/openldap-2.4.56+dfsg/clients/tools/common.c:703:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen( cvalue ); data/openldap-2.4.56+dfsg/clients/tools/common.c:971:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). passwd.bv_len = strlen( passwd.bv_val ); data/openldap-2.4.56+dfsg/clients/tools/common.c:1231:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len_proto = strlen( lud->lud_scheme ); data/openldap-2.4.56+dfsg/clients/tools/common.c:1276:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen( hosts[ i ] ) data/openldap-2.4.56+dfsg/clients/tools/common.c:1462:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). passwd.bv_len = strlen( passwd.bv_val ); data/openldap-2.4.56+dfsg/clients/tools/common.c:1566:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( msgbuf ); data/openldap-2.4.56+dfsg/clients/tools/common.c:1700:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). c[i].ldctl_value.bv_len = strlen( authzid ); data/openldap-2.4.56+dfsg/clients/tools/common.c:2150:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( dr->derefAttr ) + STRLENOF(": "); data/openldap-2.4.56+dfsg/clients/tools/common.c:2155:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ber_len_t tlen = strlen(dv->type); data/openldap-2.4.56+dfsg/clients/tools/common.c:2338:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen( ctrls[i]->ldctl_oid ); data/openldap-2.4.56+dfsg/clients/tools/ldapcompare.c:217:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bvalue.bv_len = strlen( bvalue.bv_val ); data/openldap-2.4.56+dfsg/clients/tools/ldapcompare.c:221:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bvalue.bv_val = malloc( strlen( &sep[1] )); data/openldap-2.4.56+dfsg/clients/tools/ldapcompare.c:223:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (unsigned char *) bvalue.bv_val, strlen( &sep[1] )); data/openldap-2.4.56+dfsg/clients/tools/ldapdelete.c:209:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf[ strlen( buf ) - 1 ] = '\0'; /* remove trailing newline */ data/openldap-2.4.56+dfsg/clients/tools/ldapexop.c:147:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dn.bv_len = strlen( dn.bv_val ); data/openldap-2.4.56+dfsg/clients/tools/ldapexop.c:306:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). "oid", retoid, strlen(retoid) ); data/openldap-2.4.56+dfsg/clients/tools/ldapmodify.c:332:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( rbuf ); data/openldap-2.4.56+dfsg/clients/tools/ldapmodrdn.c:206:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf[ strlen( buf ) - 1 ] = '\0'; /* remove nl */ data/openldap-2.4.56+dfsg/clients/tools/ldappasswd.c:128:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). oldpw.bv_len = strlen( oldpw.bv_val ); data/openldap-2.4.56+dfsg/clients/tools/ldappasswd.c:143:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). newpw.bv_len = strlen( newpw.bv_val ); data/openldap-2.4.56+dfsg/clients/tools/ldappasswd.c:220:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). oldpw.bv_len = strlen( oldpw.bv_val ); data/openldap-2.4.56+dfsg/clients/tools/ldappasswd.c:245:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). newpw.bv_len = strlen( newpw.bv_val ); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:805:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). def_urlpre = malloc( sizeof("file:////") + strlen(def_tmpdir) ); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:875:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). urlpre = malloc( sizeof("file:////") + strlen(tmpdir) ); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1229:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). line[ strlen( line ) - 1 ] = '\0'; data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1264:18: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). moreEntries = getchar(); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1270:19: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). moreEntries = getchar(); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1298:17: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). moreEntries = getchar(); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1304:18: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). moreEntries = getchar(); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1384:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t max_fsize = strlen( filtpatt ) + strlen( value ) + 1, outlen; data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1384:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t max_fsize = strlen( filtpatt ) + strlen( value ) + 1, outlen; data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1450:3: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). getchar(); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1624:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tool_write_ldif( LDIF_PUT_COMMENT, NULL, ufn, ufn ? strlen( ufn ) : 0 ); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1644:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tool_write_ldif( LDIF_PUT_VALUE, "ufn", ufn, ufn ? strlen( ufn ) : 0 ); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1695:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). &tmpfname[strlen(tmpdir) + sizeof(LDAP_DIRSEP) - 1] ); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1698:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tool_write_ldif( LDIF_PUT_URL, bv.bv_val, url, strlen( url )); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1737:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). "ref", refs[i], strlen(refs[i]) ); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1770:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). "extended", retoid, retoid ? strlen(retoid) : 0 ); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1808:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). "partial", retoid, retoid ? strlen(retoid) : 0 ); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1868:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). "matchedDN", matcheddn, strlen(matcheddn) ); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1888:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). next ? (size_t) (next - line) : strlen( line )); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1895:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text, strlen(text) ); data/openldap-2.4.56+dfsg/clients/tools/ldapsearch.c:1909:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tool_write_ldif( LDIF_PUT_VALUE, "ref", refs[i], strlen(refs[i]) ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:110:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->type_id)->identifier.bv_len = strlen("type_id"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:126:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->value)->identifier.bv_len = strlen("value"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:200:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "type_id", strlen("type_id") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:218:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "value", strlen("value") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:338:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->type_id)->identifier.bv_len = strlen("type_id"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:351:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->value)->identifier.bv_len = strlen("value"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:375:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->extension)->identifier.bv_len = strlen("extension"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:444:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "type_id", strlen("type_id") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:462:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "value", strlen("value") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:481:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "extension", strlen("extension") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:648:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.teletexString)->identifier.bv_len = strlen("teletexString"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:658:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.printableString)->identifier.bv_len = strlen("printableString"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:668:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.universalString)->identifier.bv_len = strlen("universalString"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:678:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.utf8String)->identifier.bv_len = strlen("utf8String"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:688:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.bmpString)->identifier.bv_len = strlen("bmpString"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:750:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strncmp("teletexString",peek_head, strlen("teletexString")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:757:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if( strncmp("printableString",peek_head,strlen("printableString")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:764:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if( strncmp("universalString",peek_head,strlen("universalString")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:771:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if( strncmp("utf8String",peek_head,strlen("utf8String")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:778:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if( strncmp("bmpString",peek_head,strlen("bmpString")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:900:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->nameAssigner)->identifier.bv_len = strlen("nameAssigner"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:918:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->partyName)->identifier.bv_len = strlen("partyName"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:992:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "nameAssigner", strlen("nameAssigner") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1010:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "partyName", strlen("partyName") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1242:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.otherName)->identifier.bv_len = strlen("otherName"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1262:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.rfc822Name)->identifier.bv_len = strlen("rfc822Name"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1282:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.dNSName)->identifier.bv_len = strlen("dNSName"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1300:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.x400Address)->identifier.bv_len = strlen("x400Address"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1315:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.directoryName)->identifier.bv_len = strlen("directoryName"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1333:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.ediPartyName)->identifier.bv_len = strlen("ediPartyName"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1353:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.uniformResourceIdentifier)->identifier.bv_len = strlen("uniformResourceIdentifier"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1373:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.iPAddress)->identifier.bv_len = strlen("iPAddress"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1391:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.registeredID)->identifier.bv_len = strlen("registeredID"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1455:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strncmp("otherName",peek_head, strlen("otherName")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1462:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if( strncmp("rfc822Name",peek_head,strlen("rfc822Name")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1469:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if( strncmp("dNSName",peek_head,strlen("dNSName")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1476:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if( strncmp("x400Address",peek_head,strlen("x400Address")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1483:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if( strncmp("directoryName",peek_head,strlen("directoryName")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1490:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if( strncmp("ediPartyName",peek_head,strlen("ediPartyName")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1497:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if( strncmp("uniformResourceIdentifier",peek_head,strlen("uniformResourceIdentifier")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1504:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if( strncmp("iPAddress",peek_head,strlen("iPAddress")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1511:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if( strncmp("registeredID",peek_head,strlen("registeredID")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1875:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->keyIdentifier)->identifier.bv_len = strlen("keyIdentifier"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1898:63: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->authorityCertIssuer)->identifier.bv_len = strlen("authorityCertIssuer"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1919:69: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->authorityCertSerialNumber)->identifier.bv_len = strlen("authorityCertSerialNumber"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:1987:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "keyIdentifier", strlen("keyIdentifier") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:2005:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "authorityCertIssuer", strlen("authorityCertIssuer") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/authorityKeyIdentifier.c:2023:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "authorityCertSerialNumber", strlen("authorityCertSerialNumber") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:169:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->algorithm)->identifier.bv_len = strlen("algorithm"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:193:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->parameters)->identifier.bv_len = strlen("parameters"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:262:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "algorithm", strlen("algorithm") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:280:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "parameters", strlen("parameters") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:409:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.utcTime)->identifier.bv_len = strlen("utcTime"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:419:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.generalizedTime)->identifier.bv_len = strlen("generalizedTime"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:481:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strncmp("utcTime",peek_head, strlen("utcTime")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:488:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if( strncmp("generalizedTime",peek_head,strlen("generalizedTime")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:609:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->extnID)->identifier.bv_len = strlen("extnID"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:624:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->critical)->identifier.bv_len = strlen("critical"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:637:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->extnValue)->identifier.bv_len = strlen("extnValue"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:658:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->critical)->identifier.bv_len = strlen("critical"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:717:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "extnID", strlen("extnID") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:735:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "critical", strlen("critical") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:757:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "extnValue", strlen("extnValue") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:871:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->type)->identifier.bv_len = strlen("type"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:884:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->value)->identifier.bv_len = strlen("value"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:953:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "type", strlen("type") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:971:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "value", strlen("value") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1091:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->notBefore)->identifier.bv_len = strlen("notBefore"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1109:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->notAfter)->identifier.bv_len = strlen("notAfter"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1181:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "notBefore", strlen("notBefore") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1199:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "notAfter", strlen("notAfter") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1314:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->algorithm)->identifier.bv_len = strlen("algorithm"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1330:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->subjectPublicKey)->identifier.bv_len = strlen("subjectPublicKey"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1402:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "algorithm", strlen("algorithm") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:1420:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "subjectPublicKey", strlen("subjectPublicKey") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2256:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->a.rdnSequence)->identifier.bv_len = strlen("rdnSequence"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2318:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strncmp("rdnSequence",peek_head, strlen("rdnSequence")) == 0){ data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2532:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->version)->identifier.bv_len = strlen("version"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2546:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->serialNumber)->identifier.bv_len = strlen("serialNumber"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2561:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->signature)->identifier.bv_len = strlen("signature"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2576:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->issuer)->identifier.bv_len = strlen("issuer"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2591:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->validity)->identifier.bv_len = strlen("validity"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2606:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->subject)->identifier.bv_len = strlen("subject"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2621:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->subjectPublicKeyInfo)->identifier.bv_len = strlen("subjectPublicKeyInfo"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2648:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->issuerUniqueIdentifier)->identifier.bv_len = strlen("issuerUniqueIdentifier"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2672:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->subjectUniqueIdentifier)->identifier.bv_len = strlen("subjectUniqueIdentifier"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2704:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->extensions)->identifier.bv_len = strlen("extensions"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2724:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->version)->identifier.bv_len = strlen("version"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2783:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "version", strlen("version") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2805:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "serialNumber", strlen("serialNumber") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2823:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "signature", strlen("signature") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2841:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "issuer", strlen("issuer") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2859:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "validity", strlen("validity") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2877:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "subject", strlen("subject") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2895:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "subjectPublicKeyInfo", strlen("subjectPublicKeyInfo") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2913:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "issuerUniqueIdentifier", strlen("issuerUniqueIdentifier") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2931:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "subjectUniqueIdentifier", strlen("subjectUniqueIdentifier") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:2949:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "extensions", strlen("extensions") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3075:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->toBeSigned)->identifier.bv_len = strlen("toBeSigned"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3090:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->signatureAlgorithm)->identifier.bv_len = strlen("signatureAlgorithm"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3106:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->signature)->identifier.bv_len = strlen("signature"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3178:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "toBeSigned", strlen("toBeSigned") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3196:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "signatureAlgorithm", strlen("signatureAlgorithm") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/certificate.c:3214:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "signature", strlen("signature") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:1216:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strLen = strlen ( peek_head ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:1767:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strLen = strlen ( oid ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2036:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strLen = strlen( ch_oid ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/componentlib.c:2107:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). oid.octetLen = strlen ( oid.octs ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:124:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->userCertificate)->identifier.bv_len = strlen("userCertificate"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:142:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->revocationDate)->identifier.bv_len = strlen("revocationDate"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:168:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->crlEntryExtensions)->identifier.bv_len = strlen("crlEntryExtensions"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:240:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "userCertificate", strlen("userCertificate") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:258:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "revocationDate", strlen("revocationDate") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:276:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "crlEntryExtensions", strlen("crlEntryExtensions") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:695:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->version)->identifier.bv_len = strlen("version"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:707:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->signature)->identifier.bv_len = strlen("signature"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:722:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->issuer)->identifier.bv_len = strlen("issuer"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:740:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->thisUpdate)->identifier.bv_len = strlen("thisUpdate"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:758:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->nextUpdate)->identifier.bv_len = strlen("nextUpdate"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:770:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->revokedCertificates)->identifier.bv_len = strlen("revokedCertificates"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:805:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->crlExtensions)->identifier.bv_len = strlen("crlExtensions"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:879:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "version", strlen("version") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:897:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "signature", strlen("signature") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:915:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "issuer", strlen("issuer") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:933:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "thisUpdate", strlen("thisUpdate") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:951:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "nextUpdate", strlen("nextUpdate") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:969:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "revokedCertificates", strlen("revokedCertificates") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:987:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "crlExtensions", strlen("crlExtensions") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1116:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->tbsCertList)->identifier.bv_len = strlen("tbsCertList"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1131:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (k->signatureAlgorithm)->identifier.bv_len = strlen("signatureAlgorithm"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1147:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (&k->signature)->identifier.bv_len = strlen("signature"); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1222:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "tbsCertList", strlen("tbsCertList") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1240:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "signatureAlgorithm", strlen("signatureAlgorithm") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/crl.c:1258:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strncmp( peek_head, "signature", strlen("signature") ) == 0 ) { data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:67:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). type.bv_len = strlen ( aliasing_at_name ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:73:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). type.bv_len = strlen ( aliased_at_name ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:79:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). type.bv_len = strlen ( mr_name); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:84:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). type.bv_len = strlen ( component_filter ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:142:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mr.bv_len = strlen(asntype_to_compMR_mapping_tbl[id].atc_equality); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:148:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mr.bv_len = strlen(asntype_to_compMR_mapping_tbl[id].atc_approx); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:155:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mr.bv_len = strlen(asntype_to_compMR_mapping_tbl[id].atc_ordering); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:162:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mr.bv_len = strlen(asntype_to_compMR_mapping_tbl[id].atc_substr); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:190:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mr_name.bv_len = strlen( tmp ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:210:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). odm = RetrieveOidDecoderMappingbyOid( oid, strlen(oid) ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:394:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strncmp( mr->smr_mrule.mr_oid, DN_MATCH_OID, strlen(DN_MATCH_OID) ) != 0 ) data/openldap-2.4.56+dfsg/contrib/slapd-modules/comp_match/init.c:402:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strncmp( mr->smr_mrule.mr_oid, RDN_MATCH_OID, strlen(RDN_MATCH_OID) ) != 0 ) data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c:345:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AC_MEMCPY( next, next + 1, strlen( next + 1 ) + 1 ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c:351:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). next + 1, strlen( next + 1 ) + 1 ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c:377:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen( buf ); \ data/openldap-2.4.56+dfsg/contrib/slapd-modules/dsaschema/dsaschema.c:410:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && (p = line + strlen( line ) - 1)[ 0 ] == '\\' data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/host.c:146:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cbp.addr.bv_len = strlen(cbp.buf);, data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/netgroup.c:83:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). WRITE_STRING_STRIPSPACE_LEN(fp,str,strlen(str)) data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/network.c:146:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cbp.addr.bv_len = strlen(cbp.buf);, data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/nslcd-prot.h:107:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). WRITE_INT32(fp, strlen(str)); \ data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.c:270:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rv = read(fp->fd, fp->readbuffer.buffer + fp->readbuffer.start, len); data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nss-pam-ldapd/tio.c:315:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rv = read(fp->fd, fp->readbuffer.buffer, len); data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/nssov.c:894:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(addr.sun_path,NSLCD_SOCKET,sizeof(addr.sun_path)); data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/pam.c:302:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pi.pwd.bv_val, ni->ni_pam_pwdmgr_pwd.bv_val, data/openldap-2.4.56+dfsg/contrib/slapd-modules/nssov/shadow.c:91:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buffer,date->bv_val,l); data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/argon2/pw-argon2.c:134:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hash->bv_len = strlen( hash->bv_val ); data/openldap-2.4.56+dfsg/contrib/slapd-modules/passwd/sha2/sha2.c:90:32: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. #error Define BYTE_ORDER to be equal to either LITTLE_ENDIAN or BIG_ENDIAN data/openldap-2.4.56+dfsg/contrib/slapd-modules/smbk5pwd/smbk5pwd.c:200:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( UcasePassword, passwd->bv_val, 14 ); data/openldap-2.4.56+dfsg/include/ac/dirent.h:22:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). # define NAMLEN(dirent) strlen((dirent)->d_name) data/openldap-2.4.56+dfsg/include/ac/socket.h:140:33: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). # define tcp_read( s, buf, len) read( s, buf, len ) data/openldap-2.4.56+dfsg/libraries/liblber/encode.c:273:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ber_put_ostring( ber, str, strlen( str ), tag ); data/openldap-2.4.56+dfsg/libraries/liblber/etest.c:143:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rc = ber_printf( ber, fmt, buf, strlen(buf) ); data/openldap-2.4.56+dfsg/libraries/liblber/memory.c:558:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new->bv_len = len ? len : strlen( s ); data/openldap-2.4.56+dfsg/libraries/liblber/memory.c:642:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( s ) + 1; data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c:493:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return read( sbiod->sbiod_sb->sb_fd, buf, len ); data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c:740:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return read( sbiod->sbiod_sb->sb_fd, buf, len ); data/openldap-2.4.56+dfsg/libraries/liblber/sockbuf.c:799:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sbiod->sbiod_pvt = LBER_MALLOC( strlen( arg ) + 1 ); data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:117:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, str, sizeof(buf) ); data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:174:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (end && strlen(ss) > (rem=end-s2)) { data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:175:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s2, ss, rem); data/openldap-2.4.56+dfsg/libraries/liblber/stdio.c:189:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(ptr); data/openldap-2.4.56+dfsg/libraries/libldap/charray.c:241:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slen = strlen( sep ); data/openldap-2.4.56+dfsg/libraries/libldap/charray.c:245:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen( *v ) + slen; data/openldap-2.4.56+dfsg/libraries/libldap/charray.c:264:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( p, sep, slen ); data/openldap-2.4.56+dfsg/libraries/libldap/charray.c:268:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( *v ); data/openldap-2.4.56+dfsg/libraries/libldap/charray.c:269:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( p, *v, len ); data/openldap-2.4.56+dfsg/libraries/libldap/compare.c:152:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bvalue.bv_len = (value == NULL) ? 0 : strlen( value ); data/openldap-2.4.56+dfsg/libraries/libldap/compare.c:194:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bvalue.bv_len = (value == NULL) ? 0 : strlen( value ); data/openldap-2.4.56+dfsg/libraries/libldap/cyrus.c:833:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( props[i] ); data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:148:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(s); data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:162:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(dn + loc, ","); data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:276:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). request = LDAP_MALLOC(strlen(domain) + sizeof("_ldap._tcp.")); data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:364:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(hostent_head[hostent_count].hostname, host, MAXHOST-1); data/openldap-2.4.56+dfsg/libraries/libldap/dnssrv.c:393:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buflen = strlen(hostent_head[i].hostname) + STRLENOF(":65535 "); data/openldap-2.4.56+dfsg/libraries/libldap/dntest.c:84:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = fgets( buf, sizeof( buf ), stdin ) ? strlen( buf ) : 0; data/openldap-2.4.56+dfsg/libraries/libldap/getdn.c:678:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( str ); data/openldap-2.4.56+dfsg/libraries/libldap/getdn.c:917:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( str ); data/openldap-2.4.56+dfsg/libraries/libldap/getdn.c:1649:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen( val->bv_val ) == len ); data/openldap-2.4.56+dfsg/libraries/libldap/getdn.c:1724:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen( val->bv_val ) == len ); data/openldap-2.4.56+dfsg/libraries/libldap/getdn.c:1816:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen( val->bv_val ) == len ); data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:540:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). svc_principal_size = strlen(givenstr) + 1; data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:545:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). svc_principal_size = STRLENOF("ldap/") + strlen(dnsHostName) + 1; data/openldap-2.4.56+dfsg/libraries/libldap/gssapi.c:550:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). svc_principal_size = STRLENOF("ldap/") + strlen(host) + 1; data/openldap-2.4.56+dfsg/libraries/libldap/init.c:192:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). end = &start[strlen(start)-1]; data/openldap-2.4.56+dfsg/libraries/libldap/init.c:336:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path = LDAP_MALLOC(strlen(home) + strlen(file) + sizeof( LDAP_DIRSEP ".")); data/openldap-2.4.56+dfsg/libraries/libldap/init.c:336:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path = LDAP_MALLOC(strlen(home) + strlen(file) + sizeof( LDAP_DIRSEP ".")); data/openldap-2.4.56+dfsg/libraries/libldap/init.c:376:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, prefix, MAX_LDAP_ENV_PREFIX_LEN); data/openldap-2.4.56+dfsg/libraries/libldap/init.c:378:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:396:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( name ); data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:548:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namelen = strlen(name); data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:735:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nlen = ( name != NULL ) ? strlen( name ) : 0; data/openldap-2.4.56+dfsg/libraries/libldap/ldif.c:846:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( line ); data/openldap-2.4.56+dfsg/libraries/libldap/os-ip.c:261:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (void)read(s, &ch, 1); data/openldap-2.4.56+dfsg/libraries/libldap/os-local.c:152:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (void)read(s, &ch, 1); data/openldap-2.4.56+dfsg/libraries/libldap/os-local.c:334:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(path) > (sizeof( server.sun_path ) - 1) ) { data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1172:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ber_len_t len = srv->lud_dn ? strlen( srv->lud_dn ) : 0; data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1374:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( *errstrp ); data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1430:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ber_len_t len = srv->lud_dn ? strlen( srv->lud_dn ) : 0; data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1493:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *referralsp = (char *)LDAP_MALLOC( strlen( s ) + LDAP_REF_STR_LEN data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1498:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen( *referralsp ) + strlen( s ) + 2 ); data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1498:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen( *referralsp ) + strlen( s ) + 2 ); data/openldap-2.4.56+dfsg/libraries/libldap/request.c:1509:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( *referralsp, "\n" ); data/openldap-2.4.56+dfsg/libraries/libldap/sbind.c:75:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cred.bv_len = strlen( passwd ); data/openldap-2.4.56+dfsg/libraries/libldap/sbind.c:107:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cred.bv_len = strlen( passwd ); data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:166:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(s); data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:191:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&ss->val[ss->pos], s, l); data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:1047:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(res,p,q-p); data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:1074:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(res,p,q-p); data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:1153:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(res,start,len); data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:2129:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(at->at_oid, savepos, len); data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:2502:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(oc->oc_oid, savepos, len); data/openldap-2.4.56+dfsg/libraries/libldap/schema.c:2783:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(cr->cr_oid, savepos, len); data/openldap-2.4.56+dfsg/libraries/libldap/sortctrl.c:144:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy((*key)->attributeType, attrStart, attrLen); data/openldap-2.4.56+dfsg/libraries/libldap/sortctrl.c:155:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy((*key)->orderingRule, oidStart, oidLen); data/openldap-2.4.56+dfsg/libraries/libldap/test.c:67:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). line[ strlen( line ) - 1 ] = '\0'; data/openldap-2.4.56+dfsg/libraries/libldap/test.c:217:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen( tmp.mod_values[i] ); data/openldap-2.4.56+dfsg/libraries/libldap/tls_g.c:163:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read( fd, buf->data, st.st_size ); data/openldap-2.4.56+dfsg/libraries/libldap/tls_g.c:554:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len1 = strlen(name); data/openldap-2.4.56+dfsg/libraries/libldap/tls_g.c:673:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !len1 ) len1 = strlen( name ); data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:520:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (ciphers && (strlen(ciphers))) { data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:569:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (c && (strlen(c))) { data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:927:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). phrase[strlen((char*)phrase)-1] = 0; data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:1286:66: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). PK11_SETATTRS( attrs[2], CKA_LABEL, (unsigned char *) filename, strlen( filename ) + 1 ); data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:1412:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). PK11_SETATTRS( attrs[2], CKA_LABEL, (unsigned char *)filename, strlen( filename ) + 1 ); data/openldap-2.4.56+dfsg/libraries/libldap/tls_m.c:2722:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nlen = strlen( name ); data/openldap-2.4.56+dfsg/libraries/libldap/tls_o.c:641:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nlen = strlen(name); data/openldap-2.4.56+dfsg/libraries/libldap/tls_o.c:956:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tlso_bio_write( b, str, strlen( str ) ); data/openldap-2.4.56+dfsg/libraries/libldap/url.c:601:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen( u->lud_scheme ) + STRLENOF( "://" ); data/openldap-2.4.56+dfsg/libraries/libldap/url.c:842:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p = &url[strlen(url)-1]; data/openldap-2.4.56+dfsg/libraries/libldap/url.c:1429:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size += strlen(ludp->lud_host) + 1; /* host and space */ data/openldap-2.4.56+dfsg/libraries/libldap/url.c:1446:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen(ludp->lud_host); data/openldap-2.4.56+dfsg/libraries/libldap/utf-8-conv.c:389:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wcsize = strlen(utf8str) + 1; data/openldap-2.4.56+dfsg/libraries/libldap/utf-8-conv.c:466:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wcsize = strlen(mbstr) + 1; data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c:594:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( name, hp->h_name, namelen ); data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c:604:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( name, hp->h_name, namelen ); data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c:736:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( *src ) + 1; data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c:777:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_len = strlen( src->h_name ) + 1; data/openldap-2.4.56+dfsg/libraries/libldap/util-int.c:781:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). total_alias_len += strlen( *p ) + 1; data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:4186:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fname->mn_len = strlen(path); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9365:18: [1] (free) memalign: On some systems (though not Linux-based systems) an attempt to free() results from memalign() may fail. This may, on a few systems, be exploitable. Also note that memalign() may not check that the boundary parameter is correct (CWE-676). Use posix_memalign instead (defined in POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD 4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases, malloc()'s alignment may be sufficient. my.mc_wbuf[0] = memalign(env->me_os_psize, MDB_WBUF*2); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb.c:9785:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(name); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_load.c:184:7: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = fgetc(stdin); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_load.c:209:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((char *)c1); data/openldap-2.4.56+dfsg/libraries/liblmdb/mdb_load.c:229:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((char *)c1); data/openldap-2.4.56+dfsg/libraries/liblutil/entropy.c:64:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read( fd, buf, nbytes ); data/openldap-2.4.56+dfsg/libraries/liblutil/getpass.c:109:15: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ( (c = getc(fi)) != EOF && c != '\n' && c != '\r' ) data/openldap-2.4.56+dfsg/libraries/liblutil/getpeereid.c:162:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rlen = read(fd, &rname, rlen); data/openldap-2.4.56+dfsg/libraries/liblutil/md5.c:322:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lutil_MD5Update (&context, argv[j], strlen (argv[j])); data/openldap-2.4.56+dfsg/libraries/liblutil/ntservice.c:98:87: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( RegSetValueEx(hKey, "EventMessageFile", 0, REG_EXPAND_SZ, lpszBinaryPathName, strlen(lpszBinaryPathName) + 1) != ERROR_SUCCESS) data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:479:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen(b64->bv_val) == b64->bv_len ); data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:862:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( UcasePassword, cred->bv_val, 14 ); data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:890:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( storedPasswordHash, passwd->bv_val, 32 ); data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1158:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( UcasePassword, passwd->bv_val, 14 ); data/openldap-2.4.56+dfsg/libraries/liblutil/passwd.c:1227:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hash->bv_len = strlen( hash->bv_val ); data/openldap-2.4.56+dfsg/libraries/liblutil/sasl.c:167:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ? strlen( interact->result ) : 0; data/openldap-2.4.56+dfsg/libraries/liblutil/sasl.c:182:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). interact->len = strlen(input); data/openldap-2.4.56+dfsg/libraries/liblutil/sasl.c:205:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). interact->len = strlen( interact->result ); data/openldap-2.4.56+dfsg/libraries/liblutil/setproctitle.c:64:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). endargv = Argv[ Argc-1 ] + strlen( Argv[ Argc-1 ] ); data/openldap-2.4.56+dfsg/libraries/liblutil/setproctitle.c:69:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen( buf ); data/openldap-2.4.56+dfsg/libraries/liblutil/sha1.c:269:19: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((num = read(fd, buffer, sizeof(buffer))) > 0) data/openldap-2.4.56+dfsg/libraries/liblutil/testavl.c:80:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name[ strlen( name ) - 1 ] = '\0'; data/openldap-2.4.56+dfsg/libraries/liblutil/testavl.c:91:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name[ strlen( name ) - 1 ] = '\0'; data/openldap-2.4.56+dfsg/libraries/liblutil/testavl.c:100:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name[ strlen( name ) - 1 ] = '\0'; data/openldap-2.4.56+dfsg/libraries/liblutil/testtavl.c:76:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name[ strlen( name ) - 1 ] = '\0'; data/openldap-2.4.56+dfsg/libraries/liblutil/testtavl.c:87:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name[ strlen( name ) - 1 ] = '\0'; data/openldap-2.4.56+dfsg/libraries/liblutil/testtavl.c:96:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name[ strlen( name ) - 1 ] = '\0'; data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:83:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen( progname ); data/openldap-2.4.56+dfsg/libraries/liblutil/utils.c:394:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(path); data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:292:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( s ); data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:298:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, s, len ); data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:308:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen( buf ); data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:323:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uuidlen = strlen( uuidstr ); data/openldap-2.4.56+dfsg/libraries/liblutil/uuid.c:328:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, uuidstr, len ); data/openldap-2.4.56+dfsg/libraries/librewrite/ldapmap.c:179:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( p ) - 2; data/openldap-2.4.56+dfsg/libraries/librewrite/ldapmap.c:186:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( p ); data/openldap-2.4.56+dfsg/libraries/librewrite/ldapmap.c:389:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val->bv_len = strlen( val->bv_val ); data/openldap-2.4.56+dfsg/libraries/librewrite/map.c:388:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val->bv_len = strlen( val->bv_val ); data/openldap-2.4.56+dfsg/libraries/librewrite/params.c:50:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). var->lv_value.bv_len = strlen( value ); data/openldap-2.4.56+dfsg/libraries/librewrite/subst.c:64:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AC_MEMCPY((char *)p, &p[ 1 ], strlen( p ) ); data/openldap-2.4.56+dfsg/libraries/librewrite/subst.c:164:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AC_MEMCPY( &p[ 1 ], &p[ 2 ], strlen( &p[ 1 ] ) ); data/openldap-2.4.56+dfsg/libraries/librewrite/var.c:130:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( value ); data/openldap-2.4.56+dfsg/libraries/librewrite/var.c:225:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). var->lv_value.bv_len = strlen( value ); data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:200:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AC_MEMCPY( p + 3, p + 1, strlen( p + 1 ) + 1 ); data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:281:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen( pwd->pw_gecos ); data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:321:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). blen = strlen( buf ); data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:345:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val->bv_len = strlen( p ); data/openldap-2.4.56+dfsg/libraries/librewrite/xmap.c:430:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val->bv_len = strlen( val->bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2297:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( src ); data/openldap-2.4.56+dfsg/servers/slapd/aclparse.c:2557:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n = strlen( s ); data/openldap-2.4.56+dfsg/servers/slapd/ad.c:135:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( str ); data/openldap-2.4.56+dfsg/servers/slapd/ad.c:413:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). : strlen( desc.ad_tags.bv_val )); data/openldap-2.4.56+dfsg/servers/slapd/ad.c:715:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( str ); data/openldap-2.4.56+dfsg/servers/slapd/ad.c:772:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(desc->ad_cname.bv_val, bv->bv_val, bv->bv_len); data/openldap-2.4.56+dfsg/servers/slapd/ad.c:811:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( ad->ad_cname.bv_val, bv->bv_val, bv->bv_len+1 ); data/openldap-2.4.56+dfsg/servers/slapd/ad.c:1179:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lcur = line + strlen( line ); data/openldap-2.4.56+dfsg/servers/slapd/alock.c:264:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). size = read (info->al_fd, data/openldap-2.4.56+dfsg/servers/slapd/alock.c:288:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (slot_data->al_appname, (char *)slotbuf+32, ALOCK_MAX_APPNAME-1); data/openldap-2.4.56+dfsg/servers/slapd/alock.c:314:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy ((char *)slotbuf+32, slot_data->al_appname, ALOCK_MAX_APPNAME-1); data/openldap-2.4.56+dfsg/servers/slapd/alock.c:398:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (slot_data.al_appname, appname, ALOCK_MAX_APPNAME-1); data/openldap-2.4.56+dfsg/servers/slapd/alock.c:401:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filename = ber_memcalloc (1, strlen (envdir) + strlen ("/alock") + 1); data/openldap-2.4.56+dfsg/servers/slapd/alock.c:401:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filename = ber_memcalloc (1, strlen (envdir) + strlen ("/alock") + 1); data/openldap-2.4.56+dfsg/servers/slapd/at.c:115:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( name ); data/openldap-2.4.56+dfsg/servers/slapd/at.c:685:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sat->sat_cname.bv_len = strlen( cname ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:697:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( m ) != STRLENOF("-rwxrwxrwx") ) { data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:814:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( c->value_string ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/config.c:927:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(c->argv[1]); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c:402:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( fname ); data/openldap-2.4.56+dfsg/servers/slapd/back-bdb/monitor.c:406:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pathlen = strlen( path ); data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/referral.c:96:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). url.bv_len = STRLENOF( "ldap://" ) + strlen( hosts[i] ); data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/search.c:105:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). url.bv_len = STRLENOF( "ldap://" ) + strlen(hosts[i]); data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/search.c:140:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( refdn ); data/openldap-2.4.56+dfsg/servers/slapd/back-dnssrv/search.c:198:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( bv.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/bind.c:1975:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ber_len_t oidlen = strlen( ctrls[i]->ldctl_oid ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/chain.c:2124:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). = STRLENOF( "cn=" ) + strlen( li->li_uri ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/chain.c:2132:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). = STRLENOF( "cn=Operations on " ) + strlen( li->li_uri ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/config.c:636:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (int) strlen( ptr ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:308:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ul.bv_len = strlen( ul.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:509:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = ptr ? ptr - bv.bv_val : strlen(bv.bv_val); data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/monitor.c:643:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( bv.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldap/search.c:559:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). match.bv_len = strlen( match.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:437:28: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ( len && (res = read( fd, ptr, len )) ) { data/openldap-2.4.56+dfsg/servers/slapd/back-ldif/ldif.c:841:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fname_len = strlen( dir->d_name ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/config.c:501:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( m ) != STRLENOF("-rwxrwxrwx") ) { data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/config.c:568:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( c->value_string ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c:485:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( fname ); data/openldap-2.4.56+dfsg/servers/slapd/back-mdb/monitor.c:489:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pathlen = strlen( path ); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:1406:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( mt->mt_uri ) + 3 + mt->mt_psuffix.bv_len; data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:2773:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen( argv[ 0 ] ); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:3234:4: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen( s ) data/openldap-2.4.56+dfsg/servers/slapd/back-meta/config.c:3264:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( p ); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/map.c:652:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fstr->bv_len = strlen( fstr->bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/suffixmassage.c:77:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). res->bv_len = strlen( res->bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-meta/suffixmassage.c:172:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( res->bv_val, dn->bv_val, diff ); data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/conn.c:248:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( buf ); data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/database.c:330:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( buf ); data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2276:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mi->mi_startTime.bv_len = strlen( tmbuf ); data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2321:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( bv.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/init.c:2352:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen( monitor_subsys[ i ]->mss_name ); data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/rww.c:217:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( buf ); data/openldap-2.4.56+dfsg/servers/slapd/back-monitor/time.c:209:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( tmbuf ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/config.cpp:275:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bva = ndb_str2bvarray( c->argv[2], strlen( c->argv[2] ), ',', NULL ); data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:626:17: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if ( myop->equal( EID_COLUMN, eid )) { data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:629:17: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if ( myop->equal( VID_COLUMN, i )) { data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1128:14: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if ( myop->equal( i+RDN_COLUMN, rdns->nr_buf[i] )) data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1132:14: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if ( myop->equal( i+RDN_COLUMN, dummy )) data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1406:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if ( myop[i]->equal( j+RDN_COLUMN, NA->rdns->nr_buf[j] )) data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/ndbio.cpp:1410:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if ( myop[i]->equal( j+RDN_COLUMN, dummy )) data/openldap-2.4.56+dfsg/servers/slapd/back-ndb/search.cpp:387:10: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. ixop->equal( EID_COLUMN, eid ); data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c:290:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pwlen = strlen( pw->pw_name ); data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c:343:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, val.bv_val, i ); data/openldap-2.4.56+dfsg/servers/slapd/back-passwd/search.c:351:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val.bv_len = strlen( val.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-shell/config.c:121:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( bv.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/back-shell/result.c:82:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( line ); data/openldap-2.4.56+dfsg/servers/slapd/back-sock/extended.c:61:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen(b64.bv_val) == b64.bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/back-sock/result.c:88:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( line ); data/openldap-2.4.56+dfsg/servers/slapd/back-sql/add.c:204:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). col_len = strlen( row.cols[ i ] ); data/openldap-2.4.56+dfsg/servers/slapd/back-sql/config.c:315:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( ba->ba_name ); data/openldap-2.4.56+dfsg/servers/slapd/back-sql/config.c:318:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len += strlen( ba->ba_argv[i] ) + 3; data/openldap-2.4.56+dfsg/servers/slapd/back-sql/config.c:498:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ber_str2bv( c->argv[ 1 ], strlen( c->argv[ 1 ] ) + 1, 1, data/openldap-2.4.56+dfsg/servers/slapd/back-sql/config.c:512:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) == 1 ) { data/openldap-2.4.56+dfsg/servers/slapd/back-sql/rdbms_depend/timesten/dnreverse/dnreverse.cpp:113:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ((j=0, i = strlen(dnP)-1); i > -1; (j++, i--)) { data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:76:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || dest->bb_val.bv_len == strlen( dest->bb_val.bv_val ) ); data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:90:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cslen = strlen( cstr ); data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:145:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || dest->bb_val.bv_len == strlen( dest->bb_val.bv_val ) ); data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:182:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cslen = strlen( cstr ); data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:361:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( pos == NULL || ( ( e = pos[ strlen( s ) ] ) != '\0' && e != ',' ) ) { data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:412:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). real_end = start + strlen( start ); data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:416:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AC_MEMCPY( real_end, real_end + 1, strlen( real_end ) ); data/openldap-2.4.56+dfsg/servers/slapd/back-sql/util.c:531:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uuid.bv_len = strlen( uuidbuf ); data/openldap-2.4.56+dfsg/servers/slapd/backglue.c:131:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen (rs->sr_matched); data/openldap-2.4.56+dfsg/servers/slapd/backglue.c:199:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ber_len_t oidlen = strlen( rs->sr_ctrls[k]->ldctl_oid ); data/openldap-2.4.56+dfsg/servers/slapd/backglue.c:617:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ber_len_t oidlen = strlen( gs.ctrls[c]->ldctl_oid ); data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:1898:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( c->argv[2] ); data/openldap-2.4.56+dfsg/servers/slapd/bconfig.c:6635:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( c->value_dn.bv_val + c->value_dn.bv_len, bv.bv_val, data/openldap-2.4.56+dfsg/servers/slapd/component.c:472:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cav->cav_ptr += strlen("content"); data/openldap-2.4.56+dfsg/servers/slapd/component.c:667:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cr_len = strlen ( cr_ptr ); data/openldap-2.4.56+dfsg/servers/slapd/component.c:879:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( cav_cur_len( cav ) >= strlen( str ) && data/openldap-2.4.56+dfsg/servers/slapd/component.c:880:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncmp( cav->cav_ptr, str, strlen( str ) ) == 0 ) data/openldap-2.4.56+dfsg/servers/slapd/component.c:892:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( cav_cur_len( cav ) >= strlen( str ) && data/openldap-2.4.56+dfsg/servers/slapd/component.c:893:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncmp( cav->cav_ptr, str, strlen( str ) ) == 0 ) data/openldap-2.4.56+dfsg/servers/slapd/component.c:895:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cav->cav_ptr += strlen( str ); data/openldap-2.4.56+dfsg/servers/slapd/config.c:1010:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( str ); data/openldap-2.4.56+dfsg/servers/slapd/config.c:2189:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AC_MEMCPY( next, next + 1, strlen( next + 1 ) + 1 ); data/openldap-2.4.56+dfsg/servers/slapd/config.c:2195:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). next + 1, strlen( next + 1 ) + 1 ); data/openldap-2.4.56+dfsg/servers/slapd/config.c:2222:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen( buf ); \ data/openldap-2.4.56+dfsg/servers/slapd/config.c:2264:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && ( p = line + strlen( line ) - 1 )[0] == '\\' data/openldap-2.4.56+dfsg/servers/slapd/controls.c:441:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vals[0].bv_len = strlen( sc->sc_oid ); data/openldap-2.4.56+dfsg/servers/slapd/controls.c:1955:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). st_pos = strlen( op->o_log_prefix ); data/openldap-2.4.56+dfsg/servers/slapd/cr.c:66:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( crname ); data/openldap-2.4.56+dfsg/servers/slapd/cr.c:129:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cir->cir_name.bv_len = strlen( scr->scr_oid ); data/openldap-2.4.56+dfsg/servers/slapd/cr.c:149:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cir->cir_name.bv_len = strlen( *names ); data/openldap-2.4.56+dfsg/servers/slapd/cr.c:492:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nval.bv_len = strlen(cr->scr_oid); data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1129:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). switch (strlen(value)) { data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1199:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(host) > data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1564:17: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). old_umask = umask( 0 ); data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1570:5: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask( old_umask ); data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1588:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l.sl_name.bv_len = strlen(path) + STRLENOF("PATH="); data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1610:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l.sl_name.bv_len = strlen( l.sl_name.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1621:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l.sl_name.bv_len = strlen(s) + sizeof("IP=[]:65535"); data/openldap-2.4.56+dfsg/servers/slapd/daemon.c:1625:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l.sl_name.bv_len = strlen( l.sl_name.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/dn.c:166:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen( in->bv_val ) == in->bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/dn.c:204:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen( in->bv_val ) == in->bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/dn.c:441:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen( val->bv_val ) == val->bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/dn.c:499:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen( val->bv_val ) == val->bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/dn.c:557:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen( val->bv_val ) == val->bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/dn.c:616:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen( val->bv_val ) == val->bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/dn.c:676:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen( val->bv_val ) == val->bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/dn.c:734:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen( val->bv_val ) == val->bv_len ); data/openldap-2.4.56+dfsg/servers/slapd/extended.c:288:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). oidm.bv_len = strlen( oidm.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/main.c:567:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). opt.bv_len = strlen( optarg ); data/openldap-2.4.56+dfsg/servers/slapd/main.c:670:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( optarg ); data/openldap-2.4.56+dfsg/servers/slapd/main.c:936:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ( read( waitfds[0], buf, 1 ) != 1 ) data/openldap-2.4.56+dfsg/servers/slapd/module.c:179:3: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(file_name)); data/openldap-2.4.56+dfsg/servers/slapd/mr.c:70:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( mrname ); data/openldap-2.4.56+dfsg/servers/slapd/mr.c:116:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mir->mir_name.bv_len = strlen( smr->smr_oid ); data/openldap-2.4.56+dfsg/servers/slapd/mr.c:132:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mir->mir_name.bv_len = strlen( *names ); data/openldap-2.4.56+dfsg/servers/slapd/mr.c:249:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). smr->smr_oidlen = strlen( mr->mr_oid ); data/openldap-2.4.56+dfsg/servers/slapd/mr.c:512:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nval.bv_len = strlen(mr->smr_oid); data/openldap-2.4.56+dfsg/servers/slapd/mr.c:543:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nval.bv_len = strlen(mru->smru_oid); data/openldap-2.4.56+dfsg/servers/slapd/oc.c:172:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( ocname ); data/openldap-2.4.56+dfsg/servers/slapd/oc.c:649:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). oir->oir_name.bv_len = strlen( *names ); data/openldap-2.4.56+dfsg/servers/slapd/oc.c:756:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). soc->soc_cname.bv_len = strlen( soc->soc_cname.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/oidm.c:59:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int suflen = strlen(oid + pos); data/openldap-2.4.56+dfsg/servers/slapd/oidm.c:155:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). om->som_oid.bv_len = strlen( om->som_oid.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/accesslog.c:2449:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( normalized->bv_val + len-1, "Z" ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/constraint.c:192:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len += strlen(tstr); data/openldap-2.4.56+dfsg/servers/slapd/overlays/constraint.c:396:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ber_len_t len = strlen( ap.lud->lud_filter ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:784:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tempstr.bv_val = ch_malloc( strlen( lud->lud_filter ) + 1 ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/pcache.c:1826:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). op->ors_filterstr.bv_len = strlen(filter_str); data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:592:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( pp->pwdCheckModule, a->a_vals[0].bv_val, data/openldap-2.4.56+dfsg/servers/slapd/overlays/ppolicy.c:894:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nlen = strlen(str); data/openldap-2.4.56+dfsg/servers/slapd/overlays/retcode.c:1226:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rdi.rdi_line.bv_len += strlen( c->argv[ i ] ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwm.c:2019:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen( argv[ 0 ] ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmconf.c:267:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). res = ch_calloc( sizeof( char ), strlen( s ) data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmconf.c:296:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( p ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmdn.c:174:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mdn.bv_len = strlen( mdn.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/overlays/rwmmap.c:841:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fstr->bv_len = strlen( fstr->bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/proto-slap.h:2136:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(val); \ data/openldap-2.4.56+dfsg/servers/slapd/referral.c:52:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bvin.bv_len = strlen( refDN ); data/openldap-2.4.56+dfsg/servers/slapd/referral.c:113:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( muck.bv_val, ntargetDN.bv_val, data/openldap-2.4.56+dfsg/servers/slapd/referral.c:242:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jv->bv_len = strlen( jv->bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/result.c:71:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/openldap-2.4.56+dfsg/servers/slapd/root_dse.c:330:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val.bv_len = strlen( val.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/root_dse.c:342:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val.bv_len = strlen( val.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:968:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). flen = strlen( lud->lud_filter ) + 1; data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:1054:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rc = strlen( filter ); data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:1131:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(SASL_CONFIGPATH) + 1 /* colon */ + data/openldap-2.4.56+dfsg/servers/slapd/sasl.c:1132:3: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(sasl_default_configpath) + 1 /* \0 */; data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:318:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, in->bv_val, sizeof( buf ) ); data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:626:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, val->bv_val, sizeof( buf ) ); data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:839:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). normalized->bv_len = strlen( normalized->bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1056:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, uri->bv_val, sizeof( buf ) ); data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1436:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bva[i].bv_len = idx.bv_len + strlen( SaslRegexp[i].sr_match ) + data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1437:4: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen( SaslRegexp[i].sr_replace ) + 5; data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1486:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( out->bv_val+insert, rep + off[n-1] + 2, len); data/openldap-2.4.56+dfsg/servers/slapd/saslauthz.c:1494:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( out->bv_val+insert, saslname + str[i].rm_so, len ); data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2044:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ( c = nval->bv_val, i = 0; i < count; i++, c += strlen(c) + 1 ) { data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2153:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( c ); data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:2213:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(c); data/openldap-2.4.56+dfsg/servers/slapd/schema_init.c:5704:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( normalized->bv_val + len-1, "Z" ); data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.c:160:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). line[ strlen( line ) - 1 ] = '\0'; data/openldap-2.4.56+dfsg/servers/slapd/shell-backends/shellutil.c:171:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). line[ strlen( line ) - 1 ] = '\0'; data/openldap-2.4.56+dfsg/servers/slapd/slapacl.c:316:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val.bv_len = strlen( val.bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/slapcommon.c:298:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). leakfilename = malloc( strlen( progname ) + STRLENOF( ".leak" ) + 1 ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/plugin.c:425:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pTmpExtOp->ext_oid.bv_len = strlen( pTmpOIDs[i] ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/plugin.c:735:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len += strlen(argv[j]); data/openldap-2.4.56+dfsg/servers/slapd/slapi/printmsg.c:83:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( fmt[ strlen( fmt ) - 1 ] != '\n' ) { data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c:141:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sdn->dn.bv_len = strlen( dn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c:156:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sdn->dn.bv_len = strlen( dn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c:182:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sdn->ndn.bv_len = strlen( ndn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c:197:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sdn->ndn.bv_len = strlen( ndn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c:403:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( dn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c:584:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(type) + 1 + strlen( value ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_dn.c:584:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(type) + 1 + strlen( value ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_pblock.c:857:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = ( value != NULL ) ? strlen( bv.bv_val ) : 0; data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_pblock.c:1119:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pb->pb_op->ors_filterstr.bv_len = strlen((char *)value); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_pblock.c:1157:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). an[j].an_name.bv_len = strlen( attrs[i] ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_pblock.c:1193:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pb->pb_op->ore_reqoid.bv_len = strlen((char *)value); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:178:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dn.bv_len = strlen( ldn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:406:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( value ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:427:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen(value); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:549:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mod.sm_type.bv_len = strlen( type ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:611:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mod.sm_type.bv_len = strlen( type ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:679:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val.bv_len = strlen( value ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:691:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val.bv_len = strlen( value ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:801:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bdn.bv_len = strlen( dn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:819:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bdn.bv_len = strlen( dn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:841:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bdn.bv_len = strlen( dn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:844:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bsuffix.bv_len = strlen( suffix ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:879:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assertedParentDN.bv_len = strlen( parentdn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:888:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). childDN.bv_len = strlen( childdn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:927:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dn.bv_len = strlen( _dn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:960:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ndn.bv_len = strlen( ldn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:994:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dn.bv_len = strlen( ldn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:1109:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen( s ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:1402:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). an[j].an_name.bv_len = strlen( attrs[i] ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2320:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( s ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2341:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). v->bv_len = strlen( s ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2409:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). slapi_value_set( value, (void *)strVal, strlen( strVal ) ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:2776:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mod->sml_values[i].bv_len = strlen( lmod->mod_values[i] ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:3136:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). parent_dn.bv_len = strlen( dn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:3139:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). newrdn.bv_len = strlen( rdn ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:3254:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bv.bv_len = strlen( uniqueid ); data/openldap-2.4.56+dfsg/servers/slapd/slapi/slapi_utils.c:3269:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size += strlen( ldaphost ); data/openldap-2.4.56+dfsg/servers/slapd/slappasswd.c:253:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). passwd.bv_len = strlen(passwd.bv_val); data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:1863:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sdn->bv_len = strlen( sdn->bv_val ); data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5359:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(s) == 1 && *s == '*' ) { data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5363:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(s) == 1 && *s == '+' ) { data/openldap-2.4.56+dfsg/servers/slapd/syncrepl.c:5856:68: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( WHATSLEFT <= STRLENOF( " " ATTRSSTR "=\":include:" "\"" ) + strlen( si->si_anfile ) ) return; data/openldap-2.4.56+dfsg/servers/slapd/syntax.c:200:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssyn->ssyn_oidlen = strlen(syn->syn_oid); data/openldap-2.4.56+dfsg/servers/slapd/syntax.c:358:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nval.bv_len = strlen(syn->ssyn_oid); data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:60:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen( backend ); data/openldap-2.4.56+dfsg/tests/progs/ldif-filter.c:173:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). line_len = strlen( line ); data/openldap-2.4.56+dfsg/tests/progs/slapd-addel.c:125:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). passwd.bv_len = strlen( optarg ); data/openldap-2.4.56+dfsg/tests/progs/slapd-addel.c:302:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). addmodifyop( mods, LDAP_MOD_ADD, line, value, strlen( value )); data/openldap-2.4.56+dfsg/tests/progs/slapd-modify.c:119:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). passwd.bv_len = strlen( optarg ); data/openldap-2.4.56+dfsg/tests/progs/slapd-modrdn.c:120:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). passwd.bv_len = strlen( optarg ); data/openldap-2.4.56+dfsg/tests/progs/slapd-mtread.c:230:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). passwd.bv_len = strlen( optarg ); data/openldap-2.4.56+dfsg/tests/progs/slapd-read.c:151:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). passwd.bv_len = strlen( optarg ); data/openldap-2.4.56+dfsg/tests/progs/slapd-search.c:160:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). passwd.bv_len = strlen( optarg ); data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:80:26: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. #define ArgDup(x) strdup(strcat(strcat(strcpy(argbuf,"\""),x),"\"")) data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:80:40: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. #define ArgDup(x) strdup(strcat(strcat(strcpy(argbuf,"\""),x),"\"")) data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:357:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memset( optarg, '*', strlen( optarg ) ); data/openldap-2.4.56+dfsg/tests/progs/slapd-tester.c:405:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if ( !strncasecmp( file->d_name, TADDFILE, strlen( TADDFILE )) ANALYSIS SUMMARY: Hits = 2355 Lines analyzed = 401428 in approximately 9.66 seconds (41559 lines/second) Physical Source Lines of Code (SLOC) = 300002 Hits@level = [0] 2558 [1] 581 [2] 1341 [3] 48 [4] 382 [5] 3 Hits@level+ = [0+] 4913 [1+] 2355 [2+] 1774 [3+] 433 [4+] 385 [5+] 3 Hits/KSLOC@level+ = [0+] 16.3766 [1+] 7.84995 [2+] 5.91329 [3+] 1.44332 [4+] 1.28332 [5+] 0.00999993 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.