Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/scamper-20191102/internal.h Examining data/scamper-20191102/mjl_heap.c Examining data/scamper-20191102/mjl_heap.h Examining data/scamper-20191102/mjl_list.c Examining data/scamper-20191102/mjl_list.h Examining data/scamper-20191102/mjl_patricia.c Examining data/scamper-20191102/mjl_patricia.h Examining data/scamper-20191102/mjl_prefixtree.c Examining data/scamper-20191102/mjl_prefixtree.h Examining data/scamper-20191102/mjl_splaytree.c Examining data/scamper-20191102/mjl_splaytree.h Examining data/scamper-20191102/mjl_threadpool.c Examining data/scamper-20191102/mjl_threadpool.h Examining data/scamper-20191102/utils.c Examining data/scamper-20191102/utils.h Examining data/scamper-20191102/scamper/scamper.c Examining data/scamper-20191102/scamper/scamper.h Examining data/scamper-20191102/scamper/scamper_addr.c Examining data/scamper-20191102/scamper/scamper_addr.h Examining data/scamper-20191102/scamper/scamper_addr2mac.c Examining data/scamper-20191102/scamper/scamper_addr2mac.h Examining data/scamper-20191102/scamper/scamper_control.c Examining data/scamper-20191102/scamper/scamper_control.h Examining data/scamper-20191102/scamper/scamper_cyclemon.c Examining data/scamper-20191102/scamper/scamper_cyclemon.h Examining data/scamper-20191102/scamper/scamper_debug.c Examining data/scamper-20191102/scamper/scamper_debug.h Examining data/scamper-20191102/scamper/scamper_dl.c Examining data/scamper-20191102/scamper/scamper_dl.h Examining data/scamper-20191102/scamper/scamper_dlhdr.c Examining data/scamper-20191102/scamper/scamper_dlhdr.h Examining data/scamper-20191102/scamper/scamper_fds.c Examining data/scamper-20191102/scamper/scamper_fds.h Examining data/scamper-20191102/scamper/scamper_file.c Examining data/scamper-20191102/scamper/scamper_file.h Examining data/scamper-20191102/scamper/scamper_file_arts.c Examining data/scamper-20191102/scamper/scamper_file_arts.h Examining data/scamper-20191102/scamper/scamper_file_json.c Examining data/scamper-20191102/scamper/scamper_file_json.h Examining data/scamper-20191102/scamper/scamper_file_text.c Examining data/scamper-20191102/scamper/scamper_file_text.h Examining data/scamper-20191102/scamper/scamper_file_warts.c Examining data/scamper-20191102/scamper/scamper_file_warts.h Examining data/scamper-20191102/scamper/scamper_firewall.c Examining data/scamper-20191102/scamper/scamper_firewall.h Examining data/scamper-20191102/scamper/scamper_getsrc.c Examining data/scamper-20191102/scamper/scamper_getsrc.h Examining data/scamper-20191102/scamper/scamper_icmp4.c Examining data/scamper-20191102/scamper/scamper_icmp4.h Examining data/scamper-20191102/scamper/scamper_icmp6.c Examining data/scamper-20191102/scamper/scamper_icmp6.h Examining data/scamper-20191102/scamper/scamper_icmp_resp.c Examining data/scamper-20191102/scamper/scamper_icmp_resp.h Examining data/scamper-20191102/scamper/scamper_icmpext.c Examining data/scamper-20191102/scamper/scamper_icmpext.h Examining data/scamper-20191102/scamper/scamper_if.c Examining data/scamper-20191102/scamper/scamper_if.h Examining data/scamper-20191102/scamper/scamper_ip4.c Examining data/scamper-20191102/scamper/scamper_ip4.h Examining data/scamper-20191102/scamper/scamper_ip6.c Examining data/scamper-20191102/scamper/scamper_ip6.h Examining data/scamper-20191102/scamper/scamper_linepoll.c Examining data/scamper-20191102/scamper/scamper_linepoll.h Examining data/scamper-20191102/scamper/scamper_list.c Examining data/scamper-20191102/scamper/scamper_list.h Examining data/scamper-20191102/scamper/scamper_options.c Examining data/scamper-20191102/scamper/scamper_options.h Examining data/scamper-20191102/scamper/scamper_osinfo.c Examining data/scamper-20191102/scamper/scamper_osinfo.h Examining data/scamper-20191102/scamper/scamper_outfiles.c Examining data/scamper-20191102/scamper/scamper_outfiles.h Examining data/scamper-20191102/scamper/scamper_privsep.c Examining data/scamper-20191102/scamper/scamper_privsep.h Examining data/scamper-20191102/scamper/scamper_probe.c Examining data/scamper-20191102/scamper/scamper_probe.h Examining data/scamper-20191102/scamper/scamper_queue.c Examining data/scamper-20191102/scamper/scamper_queue.h Examining data/scamper-20191102/scamper/scamper_rtsock.c Examining data/scamper-20191102/scamper/scamper_rtsock.h Examining data/scamper-20191102/scamper/scamper_source_cmdline.c Examining data/scamper-20191102/scamper/scamper_source_cmdline.h Examining data/scamper-20191102/scamper/scamper_source_control.c Examining data/scamper-20191102/scamper/scamper_source_control.h Examining data/scamper-20191102/scamper/scamper_source_file.c Examining data/scamper-20191102/scamper/scamper_source_file.h Examining data/scamper-20191102/scamper/scamper_source_tsps.c Examining data/scamper-20191102/scamper/scamper_source_tsps.h Examining data/scamper-20191102/scamper/scamper_sources.c Examining data/scamper-20191102/scamper/scamper_sources.h Examining data/scamper-20191102/scamper/scamper_task.c Examining data/scamper-20191102/scamper/scamper_task.h Examining data/scamper-20191102/scamper/scamper_tcp4.c Examining data/scamper-20191102/scamper/scamper_tcp4.h Examining data/scamper-20191102/scamper/scamper_tcp6.c Examining data/scamper-20191102/scamper/scamper_tcp6.h Examining data/scamper-20191102/scamper/scamper_udp4.c Examining data/scamper-20191102/scamper/scamper_udp4.h Examining data/scamper-20191102/scamper/scamper_udp6.c Examining data/scamper-20191102/scamper/scamper_udp6.h Examining data/scamper-20191102/scamper/scamper_writebuf.c Examining data/scamper-20191102/scamper/scamper_writebuf.h Examining data/scamper-20191102/scamper/dealias/scamper_dealias.c Examining data/scamper-20191102/scamper/dealias/scamper_dealias.h Examining data/scamper-20191102/scamper/dealias/scamper_dealias_do.c Examining data/scamper-20191102/scamper/dealias/scamper_dealias_do.h Examining data/scamper-20191102/scamper/dealias/scamper_dealias_json.c Examining data/scamper-20191102/scamper/dealias/scamper_dealias_json.h Examining data/scamper-20191102/scamper/dealias/scamper_dealias_text.c Examining data/scamper-20191102/scamper/dealias/scamper_dealias_text.h Examining data/scamper-20191102/scamper/dealias/scamper_dealias_warts.c Examining data/scamper-20191102/scamper/dealias/scamper_dealias_warts.h Examining data/scamper-20191102/scamper/host/scamper_host.c Examining data/scamper-20191102/scamper/host/scamper_host.h Examining data/scamper-20191102/scamper/host/scamper_host_do.c Examining data/scamper-20191102/scamper/host/scamper_host_do.h Examining data/scamper-20191102/scamper/host/scamper_host_warts.c Examining data/scamper-20191102/scamper/host/scamper_host_warts.h Examining data/scamper-20191102/scamper/neighbourdisc/scamper_neighbourdisc.c Examining data/scamper-20191102/scamper/neighbourdisc/scamper_neighbourdisc.h Examining data/scamper-20191102/scamper/neighbourdisc/scamper_neighbourdisc_do.c Examining data/scamper-20191102/scamper/neighbourdisc/scamper_neighbourdisc_do.h Examining data/scamper-20191102/scamper/neighbourdisc/scamper_neighbourdisc_warts.c Examining data/scamper-20191102/scamper/neighbourdisc/scamper_neighbourdisc_warts.h Examining data/scamper-20191102/scamper/ping/scamper_ping.c Examining data/scamper-20191102/scamper/ping/scamper_ping.h Examining data/scamper-20191102/scamper/ping/scamper_ping_do.c Examining data/scamper-20191102/scamper/ping/scamper_ping_do.h Examining data/scamper-20191102/scamper/ping/scamper_ping_json.c Examining data/scamper-20191102/scamper/ping/scamper_ping_json.h Examining data/scamper-20191102/scamper/ping/scamper_ping_text.c Examining data/scamper-20191102/scamper/ping/scamper_ping_text.h Examining data/scamper-20191102/scamper/ping/scamper_ping_warts.c Examining data/scamper-20191102/scamper/ping/scamper_ping_warts.h Examining data/scamper-20191102/scamper/sniff/scamper_sniff.c Examining data/scamper-20191102/scamper/sniff/scamper_sniff.h Examining data/scamper-20191102/scamper/sniff/scamper_sniff_do.c Examining data/scamper-20191102/scamper/sniff/scamper_sniff_do.h Examining data/scamper-20191102/scamper/sniff/scamper_sniff_warts.c Examining data/scamper-20191102/scamper/sniff/scamper_sniff_warts.h Examining data/scamper-20191102/scamper/sting/scamper_sting.c Examining data/scamper-20191102/scamper/sting/scamper_sting.h Examining data/scamper-20191102/scamper/sting/scamper_sting_do.c Examining data/scamper-20191102/scamper/sting/scamper_sting_do.h Examining data/scamper-20191102/scamper/sting/scamper_sting_text.c Examining data/scamper-20191102/scamper/sting/scamper_sting_text.h Examining data/scamper-20191102/scamper/sting/scamper_sting_warts.c Examining data/scamper-20191102/scamper/sting/scamper_sting_warts.h Examining data/scamper-20191102/scamper/tbit/scamper_tbit.c Examining data/scamper-20191102/scamper/tbit/scamper_tbit.h Examining data/scamper-20191102/scamper/tbit/scamper_tbit_do.c Examining data/scamper-20191102/scamper/tbit/scamper_tbit_do.h Examining data/scamper-20191102/scamper/tbit/scamper_tbit_json.c Examining data/scamper-20191102/scamper/tbit/scamper_tbit_json.h Examining data/scamper-20191102/scamper/tbit/scamper_tbit_text.c Examining data/scamper-20191102/scamper/tbit/scamper_tbit_text.h Examining data/scamper-20191102/scamper/tbit/scamper_tbit_warts.c Examining data/scamper-20191102/scamper/tbit/scamper_tbit_warts.h Examining data/scamper-20191102/scamper/trace/scamper_trace.c Examining data/scamper-20191102/scamper/trace/scamper_trace.h Examining data/scamper-20191102/scamper/trace/scamper_trace_do.c Examining data/scamper-20191102/scamper/trace/scamper_trace_do.h Examining data/scamper-20191102/scamper/trace/scamper_trace_json.c Examining data/scamper-20191102/scamper/trace/scamper_trace_json.h Examining data/scamper-20191102/scamper/trace/scamper_trace_text.c Examining data/scamper-20191102/scamper/trace/scamper_trace_text.h Examining data/scamper-20191102/scamper/trace/scamper_trace_warts.c Examining data/scamper-20191102/scamper/trace/scamper_trace_warts.h Examining data/scamper-20191102/scamper/tracelb/scamper_tracelb.c Examining data/scamper-20191102/scamper/tracelb/scamper_tracelb.h Examining data/scamper-20191102/scamper/tracelb/scamper_tracelb_do.c Examining data/scamper-20191102/scamper/tracelb/scamper_tracelb_do.h Examining data/scamper-20191102/scamper/tracelb/scamper_tracelb_json.c Examining data/scamper-20191102/scamper/tracelb/scamper_tracelb_json.h Examining data/scamper-20191102/scamper/tracelb/scamper_tracelb_text.c Examining data/scamper-20191102/scamper/tracelb/scamper_tracelb_text.h Examining data/scamper-20191102/scamper/tracelb/scamper_tracelb_warts.c Examining data/scamper-20191102/scamper/tracelb/scamper_tracelb_warts.h Examining data/scamper-20191102/utils/sc_ally/sc_ally.c Examining data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c Examining data/scamper-20191102/utils/sc_attach/sc_attach.c Examining data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c Examining data/scamper-20191102/utils/sc_erosprober/sc_erosprober.c Examining data/scamper-20191102/utils/sc_filterpolicy/sc_filterpolicy.c Examining data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c Examining data/scamper-20191102/utils/sc_ipiddump/sc_ipiddump.c Examining data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c Examining data/scamper-20191102/utils/sc_radargun/sc_radargun.c Examining data/scamper-20191102/utils/sc_remoted/sc_remoted.c Examining data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c Examining data/scamper-20191102/utils/sc_tbitblind/sc_tbitblind.c Examining data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c Examining data/scamper-20191102/utils/sc_tracediff/sc_tracediff.c Examining data/scamper-20191102/utils/sc_ttlexp/sc_ttlexp.c Examining data/scamper-20191102/utils/sc_uptime/sc_uptime.c Examining data/scamper-20191102/utils/sc_warts2csv/sc_warts2csv.c Examining data/scamper-20191102/utils/sc_warts2json/sc_warts2json.c Examining data/scamper-20191102/utils/sc_warts2pcap/sc_warts2pcap.c Examining data/scamper-20191102/utils/sc_warts2text/sc_warts2text.c Examining data/scamper-20191102/utils/sc_wartscat/sc_wartscat.c Examining data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c Examining data/scamper-20191102/utils/sc_wartsfix/sc_wartsfix.c FINAL RESULTS: data/scamper-20191102/scamper/scamper_control.c:3380:39: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. if((uid = getuid()) != geteuid() && chown(file, uid, -1) != 0) data/scamper-20191102/scamper/scamper_privsep.c:1247:7: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. if(chown(PRIVSEP_DIR, uid, gid) == -1) data/scamper-20191102/utils/sc_remoted/sc_remoted.c:897:6: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if(chmod(filename, mode) != 0) data/scamper-20191102/internal.h:257:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define snprintf _snprintf data/scamper-20191102/internal.h:257:18: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define snprintf _snprintf data/scamper-20191102/scamper/scamper_control.c:489:15: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. ret = len = vsnprintf(msg, sizeof(msg), fs, ap); data/scamper-20191102/scamper/scamper_control.c:502:7: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(str, len+1, fs, ap); data/scamper-20191102/scamper/scamper_debug.c:119:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(message, sizeof(message), format, ap); data/scamper-20191102/scamper/scamper_debug.c:153:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/scamper/scamper_debug.c:187:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/scamper/scamper_debug.c:233:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(message, sizeof(message), format, ap); data/scamper-20191102/utils.c:1317:8: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. wc = vsnprintf(str + *off, left, fs, ap); data/scamper-20191102/utils.c:2284:3: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, len, sp, off); data/scamper-20191102/utils/sc_ally/sc_ally.c:496:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/utils/sc_ally/sc_ally.c:520:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c:433:7: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(buf2, buf, "(for only one responding IP)"); data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c:436:7: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(buf2, buf3, "(for multiple responding IPs)"); data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:1254:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:1278:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/utils/sc_erosprober/sc_erosprober.c:284:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/utils/sc_filterpolicy/sc_filterpolicy.c:497:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/utils/sc_filterpolicy/sc_filterpolicy.c:738:7: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(fsaddr, ""); data/scamper-20191102/utils/sc_filterpolicy/sc_filterpolicy.c:770:7: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(fsaddr, scamper_addr_tostr(item->addr, buf, sizeof(buf))); data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:380:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:404:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/utils/sc_radargun/sc_radargun.c:522:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/utils/sc_radargun/sc_radargun.c:554:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/utils/sc_remoted/sc_remoted.c:310:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, data/scamper-20191102/utils/sc_remoted/sc_remoted.c:453:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(message, sizeof(message), format, ap); data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:540:7: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/utils/sc_tbitblind/sc_tbitblind.c:307:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:444:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/utils/sc_tracediff/sc_tracediff.c:363:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(fs, a, b); data/scamper-20191102/utils/sc_tracediff/sc_tracediff.c:369:7: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(fs, i+1, data/scamper-20191102/utils/sc_uptime/sc_uptime.c:511:3: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(msg, sizeof(msg), format, ap); data/scamper-20191102/mjl_list.c:105:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *r = random(); data/scamper-20191102/scamper/scamper.c:511:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((i = getopt(argc, argv, opts)) != -1) data/scamper-20191102/scamper/scamper_privsep.c:1341:6: [3] (misc) chroot: chroot can be very helpful, but is hard to use correctly (CWE-250, CWE-22). Make sure the program immediately chdir("/"), closes file descriptors, and drops root privileges, and that all necessary files (and no more!) are in the new root. if(chroot(PRIVSEP_DIR) == -1) data/scamper-20191102/utils.c:1661:3: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(tv.tv_usec); data/scamper-20191102/utils.c:1676:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *r = random(); data/scamper-20191102/utils.c:1691:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *r = random(); data/scamper-20191102/utils.c:1706:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *r = random(); data/scamper-20191102/utils/sc_ally/sc_ally.c:320:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c:106:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((i = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_attach/sc_attach.c:196:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:904:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:6082:3: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(tv.tv_usec); data/scamper-20191102/utils/sc_erosprober/sc_erosprober.c:147:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_filterpolicy/sc_filterpolicy.c:286:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:428:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_ipiddump/sc_ipiddump.c:135:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:208:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_radargun/sc_radargun.c:304:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_radargun/sc_radargun.c:2053:3: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(now.tv_usec); data/scamper-20191102/utils/sc_remoted/sc_remoted.c:356:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:318:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_tbitblind/sc_tbitblind.c:138:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:241:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_tracediff/sc_tracediff.c:74:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((i = getopt(argc, argv, "am:n?")) != -1) data/scamper-20191102/utils/sc_ttlexp/sc_ttlexp.c:65:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_uptime/sc_uptime.c:250:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, opts)) != -1) data/scamper-20191102/utils/sc_warts2pcap/sc_warts2pcap.c:109:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, "o:s:")) != -1) data/scamper-20191102/utils/sc_warts2text/sc_warts2text.c:214:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((i = getopt(argc, argv, "d:")) != -1) data/scamper-20191102/utils/sc_wartscat/sc_wartscat.c:104:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((i = getopt(argc, argv, opts)) != -1) data/scamper-20191102/internal.h:255:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define open _open data/scamper-20191102/mjl_prefixtree.c:144:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dup, item, sizeof(prefix4_t)); data/scamper-20191102/mjl_prefixtree.c:181:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p->net, net, sizeof(struct in6_addr)); data/scamper-20191102/mjl_prefixtree.c:202:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dup, item, sizeof(prefix6_t)); data/scamper-20191102/mjl_prefixtree.c:553:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&fm.net, net, sizeof(struct in6_addr)); data/scamper-20191102/scamper/dealias/scamper_dealias.c:834:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&prefixscan->probedefs[prefixscan->probedefc], data/scamper-20191102/scamper/dealias/scamper_dealias_do.c:353:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/scamper-20191102/scamper/dealias/scamper_dealias_do.c:2033:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pfstate->probedefs[i], &pd, sizeof(pd)); data/scamper-20191102/scamper/dealias/scamper_dealias_do.c:2241:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(probe.pr_data, &u16, 2); data/scamper-20191102/scamper/dealias/scamper_dealias_do.c:2243:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(probe.pr_data, &u16, 2); data/scamper-20191102/scamper/dealias/scamper_dealias_do.c:2251:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(probe.pr_data, &u16, 2); data/scamper-20191102/scamper/dealias/scamper_dealias_do.c:2253:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(probe.pr_data, &u16, 2); data/scamper-20191102/scamper/dealias/scamper_dealias_do.c:2758:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pd[1], &pd[0], sizeof(scamper_dealias_probedef_t)); data/scamper-20191102/scamper/dealias/scamper_dealias_do.c:2962:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rg->probedefs[j], &pd[j], sizeof(scamper_dealias_probedef_t)); data/scamper-20191102/scamper/dealias/scamper_dealias_do.c:2969:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rg->probedefs[i], pd, sizeof(scamper_dealias_probedef_t)); data/scamper-20191102/scamper/dealias/scamper_dealias_do.c:3101:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(prefixscan->probedefs, &pd0, sizeof(pd0)); data/scamper-20191102/scamper/dealias/scamper_dealias_do.c:3379:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:77:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512], tmp[64]; data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:170:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], tmp[64]; data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:242:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], tmp[64]; data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:277:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[256], **replies = NULL, *rc = NULL, *str = NULL; data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:307:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, header, header_len); wc += header_len; data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:314:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, ", ", 2); data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:317:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, replies[i], reply_lens[i]); data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:321:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, "]}\0", 3); wc += 3; data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:397:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, header, header_len); wc += header_len; data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:398:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, ", \"probedefs\":[", 15); wc += 15; data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:403:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, ", ", 2); data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:406:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, pds[i], pd_lens[i]); data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:409:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, "]", 1); wc++; data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:410:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, ", \"probes\":[", 12); wc += 12; data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:417:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, ", ", 2); data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:420:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, prs[j], pr_lens[j]); data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:424:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, "]", 1); wc++; data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:425:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, "}\n", 2); wc += 2; data/scamper-20191102/scamper/dealias/scamper_dealias_text.c:46:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], a[64], b[64], c[32]; data/scamper-20191102/scamper/dealias/scamper_dealias_warts.c:499:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bytes+0, &u16, 2); data/scamper-20191102/scamper/dealias/scamper_dealias_warts.c:501:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bytes+2, &u16, 2); data/scamper-20191102/scamper/dealias/scamper_dealias_warts.c:506:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bytes+0, &u16, 2); data/scamper-20191102/scamper/dealias/scamper_dealias_warts.c:508:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bytes+2, &u16, 2); data/scamper-20191102/scamper/dealias/scamper_dealias_warts.c:701:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, &pfs, sizeof(pfs)); data/scamper-20191102/scamper/host/scamper_host_do.c:284:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qname[128]; data/scamper-20191102/scamper/host/scamper_host_do.c:407:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name+i, pktbuf+off+1, u8); data/scamper-20191102/scamper/host/scamper_host_do.c:423:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mname[256], rname[256]; data/scamper-20191102/scamper/host/scamper_host_do.c:456:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char exchange[256]; data/scamper-20191102/scamper/host/scamper_host_do.c:486:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256], str[256]; data/scamper-20191102/scamper/host/scamper_host_do.c:597:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&in4, pktbuf+off, rdlength); data/scamper-20191102/scamper/host/scamper_host_do.c:606:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&in6, pktbuf+off, rdlength); data/scamper-20191102/scamper/host/scamper_host_do.c:1133:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qname[128]; data/scamper-20191102/scamper/host/scamper_host_do.c:1335:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("/etc/resolv.conf", flags); data/scamper-20191102/scamper/neighbourdisc/scamper_neighbourdisc_do.c:262:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sol, ((uint8_t *)nd->dst_ip->addr)+12, 4); data/scamper-20191102/scamper/neighbourdisc/scamper_neighbourdisc_do.c:270:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ip6_dst+12, sol, 4); data/scamper-20191102/scamper/neighbourdisc/scamper_neighbourdisc_do.c:286:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ip6->ip6_src, nd->src_ip->addr, 16); data/scamper-20191102/scamper/neighbourdisc/scamper_neighbourdisc_do.c:287:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ip6->ip6_dst, ip6_dst, 16); data/scamper-20191102/scamper/neighbourdisc/scamper_neighbourdisc_do.c:303:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&a, &ip6->ip6_src, sizeof(struct in6_addr)); data/scamper-20191102/scamper/neighbourdisc/scamper_neighbourdisc_do.c:307:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&a, &ip6->ip6_dst, sizeof(struct in6_addr)); data/scamper-20191102/scamper/neighbourdisc/scamper_neighbourdisc_do.c:338:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[64], b[64]; data/scamper-20191102/scamper/neighbourdisc/scamper_neighbourdisc_do.c:435:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[64], mac[32]; data/scamper-20191102/scamper/neighbourdisc/scamper_neighbourdisc_do.c:818:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[64]; data/scamper-20191102/scamper/ping/scamper_ping_do.c:873:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(state->payload+off, src->addr, al); data/scamper-20191102/scamper/ping/scamper_ping_do.c:891:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(state->payload+off, ping->probe_data, ping->probe_datalen); data/scamper-20191102/scamper/ping/scamper_ping_do.c:898:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(state->payload+off,ping->probe_data,ping->probe_datalen); data/scamper-20191102/scamper/ping/scamper_ping_do.c:901:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(state->payload+off,ping->probe_data,state->payload_len-off); data/scamper-20191102/scamper/ping/scamper_ping_do.c:967:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&state->tsps_ips[i], ping->probe_tsps->ips[i]->addr, 4); data/scamper-20191102/scamper/ping/scamper_ping_do.c:1092:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(state->payload+i, &u16, 2); data/scamper-20191102/scamper/ping/scamper_ping_do.c:1097:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(state->payload+i, &u16, 2); data/scamper-20191102/scamper/ping/scamper_ping_do.c:1437:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ips[4], *ptr = tsopt; data/scamper-20191102/scamper/ping/scamper_ping_json.c:67:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024], tmp[512]; data/scamper-20191102/scamper/ping/scamper_ping_json.c:166:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512], tmp[64]; data/scamper-20191102/scamper/ping/scamper_ping_json.c:262:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512], str[64]; data/scamper-20191102/scamper/ping/scamper_ping_json.c:354:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, header, header_len); wc += header_len; data/scamper-20191102/scamper/ping/scamper_ping_json.c:355:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, ", \"responses\":[", 15); wc += 15; data/scamper-20191102/scamper/ping/scamper_ping_json.c:360:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, ",", 1); data/scamper-20191102/scamper/ping/scamper_ping_json.c:363:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, replies[i], reply_lens[i]); data/scamper-20191102/scamper/ping/scamper_ping_json.c:366:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, "],", 2); wc += 2; data/scamper-20191102/scamper/ping/scamper_ping_json.c:369:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, stats, stats_len); data/scamper-20191102/scamper/ping/scamper_ping_json.c:372:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, "}\n", 2); wc += 2; data/scamper-20191102/scamper/ping/scamper_ping_text.c:46:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[192], src[64], dst[64]; data/scamper-20191102/scamper/ping/scamper_ping_text.c:72:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], a[64], rtt[32], *tcp, flags[16], tso[32], tsr[32], tst[32]; data/scamper-20191102/scamper/ping/scamper_ping_text.c:153:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[64]; data/scamper-20191102/scamper/ping/scamper_ping_text.c:154:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/scamper-20191102/scamper/ping/scamper_ping_text.c:249:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, header, header_len); wc += header_len; data/scamper-20191102/scamper/ping/scamper_ping_text.c:252:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, replies[i], reply_lens[i]); data/scamper-20191102/scamper/ping/scamper_ping_text.c:258:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, stats, stats_len); data/scamper-20191102/scamper/scamper.c:208:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/scamper/scamper.c:374:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, mc->cmd, off); data/scamper-20191102/scamper/scamper.c:379:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+off, argv[i], tmp); data/scamper-20191102/scamper/scamper.c:475:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opts[64]; data/scamper-20191102/scamper/scamper.c:1017:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/scamper-20191102/scamper/scamper.c:1031:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(pidfile, flags, mode); data/scamper-20191102/scamper/scamper_addr.c:333:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(net, &p, sizeof(p)); data/scamper-20191102/scamper/scamper_addr.c:651:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(net, &p, sizeof(p)); data/scamper-20191102/scamper/scamper_addr2mac.c:187:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipstr[128], macstr[128]; data/scamper-20191102/scamper/scamper_addr2mac.c:233:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipstr[128], macstr[128]; data/scamper-20191102/scamper/scamper_control.c:482:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512], *str = NULL; data/scamper-20191102/scamper/scamper_control.c:638:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char descr[256], outfile[256], type[512], sw1[4]; data/scamper-20191102/scamper/scamper_control.c:809:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sab[128]; data/scamper-20191102/scamper/scamper_control.c:1025:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char autoreload[16]; data/scamper-20191102/scamper/scamper_control.c:1026:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cycles[16]; data/scamper-20191102/scamper/scamper_control.c:1027:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char priority[24]; data/scamper-20191102/scamper/scamper_control.c:1097:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/scamper-20191102/scamper/scamper_control.c:1208:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *params[24]; data/scamper-20191102/scamper/scamper_control.c:1268:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *params[4], *next; data/scamper-20191102/scamper/scamper_control.c:1329:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *files[2]; data/scamper-20191102/scamper/scamper_control.c:1468:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *params[24]; data/scamper-20191102/scamper/scamper_control.c:1636:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *params[1]; data/scamper-20191102/scamper/scamper_control.c:1679:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *params[1]; data/scamper-20191102/scamper/scamper_control.c:1716:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[1024]; data/scamper-20191102/scamper/scamper_control.c:1735:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *params[1], str[1024]; data/scamper-20191102/scamper/scamper_control.c:1779:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *params[10], *next; data/scamper-20191102/scamper/scamper_control.c:2191:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[64]; data/scamper-20191102/scamper/scamper_control.c:2238:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data, o->data + client->sof_off, len); data/scamper-20191102/scamper/scamper_control.c:2506:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/scamper/scamper_control.c:2697:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char listname[512]; data/scamper-20191102/scamper/scamper_control.c:2843:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rm->buf + rm->bufoff, buf+off, y); data/scamper-20191102/scamper/scamper_control.c:2850:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rm->buf + rm->bufoff, buf+off, x); data/scamper-20191102/scamper/scamper_control.c:2904:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+off, rm->magic, 8); off += 8; data/scamper-20191102/scamper/scamper_control.c:2909:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+off, monitorname, len); data/scamper-20191102/scamper/scamper_control.c:3145:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char port[8]; data/scamper-20191102/scamper/scamper_control.c:3309:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. random_u32(&u32); memcpy(ctrl_rem->magic+0, &u32, 4); data/scamper-20191102/scamper/scamper_control.c:3310:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. random_u32(&u32); memcpy(ctrl_rem->magic+4, &u32, 4); data/scamper-20191102/scamper/scamper_debug.c:74:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ts[16]; data/scamper-20191102/scamper/scamper_debug.c:103:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[512]; data/scamper-20191102/scamper/scamper_debug.c:104:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ts[16]; data/scamper-20191102/scamper/scamper_debug.c:139:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512], ts[16]; data/scamper-20191102/scamper/scamper_debug.c:173:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512], ts[16]; data/scamper-20191102/scamper/scamper_debug.c:208:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[512]; data/scamper-20191102/scamper/scamper_debug.c:210:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ts[16]; data/scamper-20191102/scamper/scamper_debug.c:211:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fs[64]; data/scamper-20191102/scamper/scamper_debug.c:282:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, flags, mode); data/scamper-20191102/scamper/scamper_dl.c:580:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pf, pkt, 4); data/scamper-20191102/scamper/scamper_dl.c:678:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&type, pkt+16, 2); type = ntohs(type); data/scamper-20191102/scamper/scamper_dl.c:705:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fd = open(dev, O_RDWR)) == -1) data/scamper-20191102/scamper/scamper_dl.c:727:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dev[16]; data/scamper-20191102/scamper/scamper_dl.c:781:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/scamper-20191102/scamper/scamper_dl.c:888:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/scamper-20191102/scamper/scamper_dl.c:1042:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/scamper-20191102/scamper/scamper_dl.c:1238:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[5+IFNAMSIZ]; data/scamper-20191102/scamper/scamper_dl.c:1248:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fd = open(ifname, O_RDWR)) == -1) data/scamper-20191102/scamper/scamper_dl.c:1351:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/scamper-20191102/scamper/scamper_dl.c:1630:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[64]; data/scamper-20191102/scamper/scamper_dl.c:1649:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[64], ipid[16]; data/scamper-20191102/scamper/scamper_dl.c:1679:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[64]; data/scamper-20191102/scamper/scamper_dl.c:1680:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuf[32], *flags; data/scamper-20191102/scamper/scamper_dl.c:1681:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pos[32]; data/scamper-20191102/scamper/scamper_dl.c:1682:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipid[16]; data/scamper-20191102/scamper/scamper_dl.c:1695:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(flags, tcpflags[i], 3); flags += 3; data/scamper-20191102/scamper/scamper_dl.c:1735:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[64]; data/scamper-20191102/scamper/scamper_dl.c:1736:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[256]; data/scamper-20191102/scamper/scamper_dl.c:1737:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char icmp[256]; data/scamper-20191102/scamper/scamper_dl.c:1738:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inner_ip[256]; data/scamper-20191102/scamper/scamper_dl.c:1739:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inner_transport[256]; data/scamper-20191102/scamper/scamper_dlhdr.c:58:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dlhdr->buf, mac->addr, 6); data/scamper-20191102/scamper/scamper_fds.c:188:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[128]; data/scamper-20191102/scamper/scamper_fds.c:199:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[144]; data/scamper-20191102/scamper/scamper_fds.c:200:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[128]; data/scamper-20191102/scamper/scamper_fds.c:1796:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addr, a, l); data/scamper-20191102/scamper/scamper_file.c:90:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_str[256]; data/scamper-20191102/scamper/scamper_file.c:827:28: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if(mode == 'r') fd = open(filename, flags); data/scamper-20191102/scamper/scamper_file.c:828:28: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). else fd = open(filename, flags, mo); data/scamper-20191102/scamper/scamper_file_arts.c:107:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&junk16, buf, 2); data/scamper-20191102/scamper/scamper_file_arts.c:119:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&junk32, buf+2, 4); data/scamper-20191102/scamper/scamper_file_arts.c:125:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&junk32, buf+6, 4); data/scamper-20191102/scamper/scamper_file_arts.c:129:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&junk32, buf+16, 4); data/scamper-20191102/scamper/scamper_file_arts.c:133:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&junk32, buf+12, 4); data/scamper-20191102/scamper/scamper_file_arts.c:156:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&junk32, tmp + i, 4); junk32 = ntohl(junk32); data/scamper-20191102/scamper/scamper_file_arts.c:167:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&junk32, tmp + i + 8, 4); data/scamper-20191102/scamper/scamper_file_arts.c:173:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&junk32, tmp + i + 4, 4); data/scamper-20191102/scamper/scamper_file_arts.c:260:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&junk32, buf+i, 4); i += 4; data/scamper-20191102/scamper/scamper_file_arts.c:432:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&junk32, buf+i, 4); i += 4; junk32 = ntohl(junk32); data/scamper-20191102/scamper/scamper_file_arts.c:438:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&junk32, buf+i, 4); i += 4; junk32 = ntohl(junk32); data/scamper-20191102/scamper/scamper_file_arts.c:449:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&junk32, buf+i, 4); i += 4; data/scamper-20191102/scamper/scamper_file_arts.c:454:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&junk32, buf+i, 4); i += 4; data/scamper-20191102/scamper/scamper_file_json.c:42:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/scamper-20191102/scamper/scamper_file_json.c:58:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/scamper-20191102/scamper/scamper_file_text.c:43:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[10]; data/scamper-20191102/scamper/scamper_file_warts.c:295:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf[*off], addr->addr, size); data/scamper-20191102/scamper/scamper_file_warts.c:306:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf[*off], &id, size); data/scamper-20191102/scamper/scamper_file_warts.c:318:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf[*off], &tmp, 2); data/scamper-20191102/scamper/scamper_file_warts.c:328:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf[*off], &tmp, 4); data/scamper-20191102/scamper/scamper_file_warts.c:338:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf[*off], &tmp, 4); data/scamper-20191102/scamper/scamper_file_warts.c:367:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + *off, vin, *count); data/scamper-20191102/scamper/scamper_file_warts.c:403:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + *off, &t32, 4); *off += 4; data/scamper-20191102/scamper/scamper_file_warts.c:406:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + *off, &t32, 4); *off += 4; data/scamper-20191102/scamper/scamper_file_warts.c:451:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&u32, &buf[*off], 4); u32 = ntohl(u32); data/scamper-20191102/scamper/scamper_file_warts.c:516:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, buf + *off, 2); *off += 2; data/scamper-20191102/scamper/scamper_file_warts.c:526:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, buf + *off, 4); *off += 4; data/scamper-20191102/scamper/scamper_file_warts.c:537:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&u32, buf + *off, 4); *off += 4; data/scamper-20191102/scamper/scamper_file_warts.c:582:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*out, buf + *off, *req); data/scamper-20191102/scamper/scamper_file_warts.c:603:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out, buf + *off, *req); data/scamper-20191102/scamper/scamper_file_warts.c:1877:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tmp, &buf[*off], 2); data/scamper-20191102/scamper/scamper_file_warts.c:1892:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&u16, &buf[*off], 2); u16 = ntohs(u16); data/scamper-20191102/scamper/scamper_file_warts.c:1938:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf[*off + 2 + tmp], &u16, 2); tmp += 2; data/scamper-20191102/scamper/scamper_file_warts.c:1947:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf[*off + 2 + tmp], ie->ie_data, ie->ie_dl); data/scamper-20191102/scamper/scamper_file_warts.c:1954:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&buf[*off], &u16, 2); data/scamper-20191102/scamper/scamper_file_warts.c:1991:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char offs[16]; data/scamper-20191102/scamper/scamper_firewall.c:338:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&insn_ip6->addr6, s, 16); data/scamper-20191102/scamper/scamper_firewall.c:346:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&insn_ip6->addr6, d, 16); data/scamper-20191102/scamper/scamper_firewall.c:441:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(insn_u32->d, s, 4); data/scamper-20191102/scamper/scamper_firewall.c:449:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&insn_ip6->addr6, s, 16); data/scamper-20191102/scamper/scamper_firewall.c:483:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(insn_u32->d, d, 4); data/scamper-20191102/scamper/scamper_firewall.c:491:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&insn_ip6->addr6, d, 16); data/scamper-20191102/scamper/scamper_firewall.c:600:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&fw.fw_src, s, 4); data/scamper-20191102/scamper/scamper_firewall.c:602:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&fw.fw_dst, d, 4); data/scamper-20191102/scamper/scamper_firewall.c:625:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&fw6.fw_src, s, 16); data/scamper-20191102/scamper/scamper_firewall.c:628:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&fw6.fw_dst, d, 16); data/scamper-20191102/scamper/scamper_firewall.c:850:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((pf_fd = open("/dev/pf", O_RDWR)) == -1) data/scamper-20191102/scamper/scamper_firewall.c:889:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char anchor[PF_ANCHOR_NAME_SIZE]; data/scamper-20191102/scamper/scamper_firewall.c:937:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pfr.rule.src.addr.v.a.addr.v4, s, 4); data/scamper-20191102/scamper/scamper_firewall.c:939:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pfr.rule.dst.addr.v.a.addr.v4, d, 4); data/scamper-20191102/scamper/scamper_firewall.c:944:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pfr.rule.src.addr.v.a.addr.v6, s, 16); data/scamper-20191102/scamper/scamper_firewall.c:946:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pfr.rule.src.addr.v.a.addr.v6, d, 16); data/scamper-20191102/scamper/scamper_getsrc.c:59:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/scamper-20191102/scamper/scamper_icmp4.c:117:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + 8, probe->pr_data, probe->pr_len); data/scamper-20191102/scamper/scamper_icmp4.c:120:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+2, &csum, 2); data/scamper-20191102/scamper/scamper_icmp4.c:151:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[128]; data/scamper-20191102/scamper/scamper_icmp4.c:392:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ir->ir_inner_ipopt_tsips[i], ptr, 4); data/scamper-20191102/scamper/scamper_icmp4.c:428:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ir->ir_ipopt_tsips[i], ptr, 4); data/scamper-20191102/scamper/scamper_icmp4.c:546:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ir->ir_ip_src.v4, &ip->ip_src, sizeof(struct in_addr)); data/scamper-20191102/scamper/scamper_icmp4.c:656:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&resp->ir_inner_ip_dst.v4, &ip_outer->ip_src, data/scamper-20191102/scamper/scamper_icmp4.c:700:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&resp->ir_inner_ip_dst.v4, &ip_inner->ip_dst, data/scamper-20191102/scamper/scamper_icmp4.c:840:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[32]; data/scamper-20191102/scamper/scamper_icmp6.c:158:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + ip6hlen + icmp6hlen, probe->pr_data, probe->pr_len); data/scamper-20191102/scamper/scamper_icmp6.c:176:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[128]; data/scamper-20191102/scamper/scamper_icmp6.c:223:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(txbuf + icmphdrlen, probe->pr_data, probe->pr_len); data/scamper-20191102/scamper/scamper_icmp6.c:312:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&resp->ir_ip_src.v6, &from->sin6_addr, sizeof(struct in6_addr)); data/scamper-20191102/scamper/scamper_icmp6.c:412:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&resp->ir_inner_ip_dst.v6, &from.sin6_addr, data/scamper-20191102/scamper/scamper_icmp6.c:486:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&resp->ir_inner_ip_dst.v6, &ip->ip6_dst, sizeof(struct in6_addr)); data/scamper-20191102/scamper/scamper_icmp_resp.c:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[64]; data/scamper-20191102/scamper/scamper_icmp_resp.c:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[256]; data/scamper-20191102/scamper/scamper_icmp_resp.c:49:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char icmp[256]; data/scamper-20191102/scamper/scamper_icmp_resp.c:50:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inner_ip[256]; data/scamper-20191102/scamper/scamper_icmp_resp.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inner_transport[256]; data/scamper-20191102/scamper/scamper_icmp_resp.c:52:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ext[256]; data/scamper-20191102/scamper/scamper_icmpext.c:91:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dl, u8+off, 2); data/scamper-20191102/scamper/scamper_icmpext.c:168:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&unn->un.v6, u8 + off, u16); data/scamper-20191102/scamper/scamper_icmpext.c:177:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(unn->name, &u8[off+1], u8[off]-1); data/scamper-20191102/scamper/scamper_icmpext.h:100:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/scamper-20191102/scamper/scamper_if.c:84:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IFNAMSIZ]; data/scamper-20191102/scamper/scamper_if.c:193:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mac, ifr.ifr_hwaddr.sa_data, 6); data/scamper-20191102/scamper/scamper_if.c:212:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mac, row.bPhysAddr, 6); data/scamper-20191102/scamper/scamper_if.c:227:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[5+IFNAMSIZ]; data/scamper-20191102/scamper/scamper_if.c:234:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fd = open(ifname, O_RDWR)) == -1) data/scamper-20191102/scamper/scamper_if.c:275:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mac, ctl.buf+ack->dl_addr_offset, 6); data/scamper-20191102/scamper/scamper_if.c:318:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mac, LLADDR(sdl), 6); data/scamper-20191102/scamper/scamper_ip4.c:214:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+off, &opt->opt_v4tsps_ips[j], 4); off += 4; data/scamper-20191102/scamper/scamper_ip4.c:273:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + ip4hlen, probe->pr_data, probe->pr_len); data/scamper-20191102/scamper/scamper_ip6.c:90:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+off, &opt->opt_v6rh0_ips[i], 16); data/scamper-20191102/scamper/scamper_ip6.c:98:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+off, &ip6->ip6_dst, 16); data/scamper-20191102/scamper/scamper_ip6.c:102:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ip6->ip6_dst, &opt->opt_v6rh0_ips[0], 16); data/scamper-20191102/scamper/scamper_ip6.c:217:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ip6->ip6_src, probe->pr_ip_src->addr, 16); data/scamper-20191102/scamper/scamper_ip6.c:218:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ip6->ip6_dst, probe->pr_ip_dst->addr, 16); data/scamper-20191102/scamper/scamper_ip6.c:335:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + ip6hlen, probe->pr_data, probe->pr_len); data/scamper-20191102/scamper/scamper_linepoll.c:121:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bbuf, lp->buf, lp->len); data/scamper-20191102/scamper/scamper_linepoll.c:122:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bbuf+lp->len, buf, i+1); data/scamper-20191102/scamper/scamper_linepoll.c:169:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lp->buf+lp->len, buf, len); data/scamper-20191102/scamper/scamper_linepoll.c:218:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lp->buf, buf+s, lp->len); data/scamper-20191102/scamper/scamper_outfiles.c:234:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, flags, mode); data/scamper-20191102/scamper/scamper_outfiles.c:291:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, flags, mode); data/scamper-20191102/scamper/scamper_privsep.c:365:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s, param+off, al); off += al; data/scamper-20191102/scamper/scamper_privsep.c:369:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, param+off, al); data/scamper-20191102/scamper/scamper_privsep.c:508:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(s, param+off, al); off += al; data/scamper-20191102/scamper/scamper_privsep.c:509:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, param+off, al); off += al; data/scamper-20191102/scamper/scamper_privsep.c:633:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&flags, param, sizeof(int)); data/scamper-20191102/scamper/scamper_privsep.c:672:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, flags, mode); data/scamper-20191102/scamper/scamper_privsep.c:674:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(file, flags); data/scamper-20191102/scamper/scamper_privsep.c:701:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, &rc, sizeof(int)); data/scamper-20191102/scamper/scamper_privsep.c:702:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+sizeof(int), &error, sizeof(int)); data/scamper-20191102/scamper/scamper_privsep.c:990:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param, &p1, sizeof(p1)); data/scamper-20191102/scamper/scamper_privsep.c:999:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+off, &p1, sizeof(p1)); off += sizeof(p1); data/scamper-20191102/scamper/scamper_privsep.c:1000:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+off, &p2, sizeof(p2)); off += sizeof(p2); data/scamper-20191102/scamper/scamper_privsep.c:1001:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+off, &p3, sizeof(p3)); data/scamper-20191102/scamper/scamper_privsep.c:1042:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param, &flags, sizeof(flags)); off = sizeof(flags); data/scamper-20191102/scamper/scamper_privsep.c:1045:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+off, &mode, sizeof(mode)); data/scamper-20191102/scamper/scamper_privsep.c:1050:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+off, file, len-off); data/scamper-20191102/scamper/scamper_privsep.c:1085:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param, addr, 4); data/scamper-20191102/scamper/scamper_privsep.c:1130:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, &af, sizeof(af)); len += sizeof(af); data/scamper-20191102/scamper/scamper_privsep.c:1131:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, &n, sizeof(n)); len += sizeof(n); data/scamper-20191102/scamper/scamper_privsep.c:1132:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, &p, sizeof(p)); len += sizeof(p); data/scamper-20191102/scamper/scamper_privsep.c:1133:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, s, al); len += al; data/scamper-20191102/scamper/scamper_privsep.c:1136:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, d, al); data/scamper-20191102/scamper/scamper_privsep.c:1139:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, &sp, sizeof(sp)); len += sizeof(sp); data/scamper-20191102/scamper/scamper_privsep.c:1140:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, &dp, sizeof(dp)); len += sizeof(dp); data/scamper-20191102/scamper/scamper_privsep.c:1149:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, &n, sizeof(int)); len += sizeof(n); data/scamper-20191102/scamper/scamper_privsep.c:1150:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, &af, sizeof(int)); len += sizeof(af); data/scamper-20191102/scamper/scamper_privsep.c:1178:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, &af, sizeof(af)); len += sizeof(af); data/scamper-20191102/scamper/scamper_privsep.c:1179:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, &n, sizeof(n)); len += sizeof(n); data/scamper-20191102/scamper/scamper_privsep.c:1180:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, &p, sizeof(p)); len += sizeof(p); data/scamper-20191102/scamper/scamper_privsep.c:1181:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, s, al); len += al; data/scamper-20191102/scamper/scamper_privsep.c:1182:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, d, al); len += al; data/scamper-20191102/scamper/scamper_privsep.c:1183:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, &sp, sizeof(sp)); len += sizeof(sp); data/scamper-20191102/scamper/scamper_privsep.c:1184:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param+len, &dp, sizeof(dp)); len += sizeof(dp); data/scamper-20191102/scamper/scamper_privsep.c:1192:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(param, &n, sizeof(int)); data/scamper-20191102/scamper/scamper_probe.c:149:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tcp[16]; data/scamper-20191102/scamper/scamper_probe.c:150:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pos[32]; data/scamper-20191102/scamper/scamper_probe.c:151:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[128]; data/scamper-20191102/scamper/scamper_probe.c:152:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char icmp[16]; data/scamper-20191102/scamper/scamper_probe.c:153:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tos[8]; data/scamper-20191102/scamper/scamper_probe.c:488:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pkt, dlhdr->buf, dlhdr->len); data/scamper-20191102/scamper/scamper_probe.c:920:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pktbuf+pad, probe->pr_dl_buf, probe->pr_dl_len); data/scamper-20191102/scamper/scamper_rtsock.c:207:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[80]; data/scamper-20191102/scamper/scamper_rtsock.c:299:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + sizeof(struct rt_msghdr), &sas, (size_t)slen); data/scamper-20191102/scamper/scamper_rtsock.c:384:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(RTA_DATA(rta), dst->addr, dst_len); data/scamper-20191102/scamper/scamper_rtsock.c:420:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rta_data[64]; data/scamper-20191102/scamper/scamper_source_cmdline.c:68:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp, cmd, cmdlen); data/scamper-20191102/scamper/scamper_source_cmdline.c:76:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((*out)+cmdlen+1, addr, addrlen + 1); data/scamper-20191102/scamper/scamper_source_control.c:87:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/scamper/scamper_source_file.c:122:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, O_RDONLY); data/scamper-20191102/scamper/scamper_source_file.c:176:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd_buf[256], *cmd = NULL; data/scamper-20191102/scamper/scamper_source_file.c:209:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmd, ssf->command, ssf->command_len); data/scamper-20191102/scamper/scamper_source_file.c:211:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cmd + ssf->command_len + 1, str, len+1); data/scamper-20191102/scamper/scamper_source_tsps.c:102:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(filename, O_RDONLY); data/scamper-20191102/scamper/scamper_source_tsps.c:141:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *bits[5]; data/scamper-20191102/scamper/scamper_source_tsps.c:143:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cb[256]; data/scamper-20191102/scamper/scamper_sources.c:829:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostname[MAXHOSTNAMELEN]; data/scamper-20191102/scamper/scamper_sources.c:1122:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/scamper-20191102/scamper/scamper_sources.c:1270:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[512]; data/scamper-20191102/scamper/scamper_sources.c:1951:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/scamper-20191102/scamper/scamper_task.c:362:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[64]; data/scamper-20191102/scamper/scamper_tcp4.c:105:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+2, probe->pr_tcp_fo_cookie, probe->pr_tcp_fo_cookielen); data/scamper-20191102/scamper/scamper_tcp4.c:119:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+4, probe->pr_tcp_fo_cookie, probe->pr_tcp_fo_cookielen); data/scamper-20191102/scamper/scamper_tcp4.c:221:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + tcphlen, probe->pr_data, probe->pr_len); data/scamper-20191102/scamper/scamper_tcp4.c:282:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[128]; data/scamper-20191102/scamper/scamper_tcp4.c:374:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[32]; data/scamper-20191102/scamper/scamper_tcp6.c:97:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+2, probe->pr_tcp_fo_cookie, probe->pr_tcp_fo_cookielen); data/scamper-20191102/scamper/scamper_tcp6.c:111:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+4, probe->pr_tcp_fo_cookie, probe->pr_tcp_fo_cookielen); data/scamper-20191102/scamper/scamper_tcp6.c:136:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&a, &ip6->ip6_src, sizeof(struct in6_addr)); data/scamper-20191102/scamper/scamper_tcp6.c:140:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&a, &ip6->ip6_dst, sizeof(struct in6_addr)); data/scamper-20191102/scamper/scamper_tcp6.c:274:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + ip6hlen + tcphlen, probe->pr_data, probe->pr_len); data/scamper-20191102/scamper/scamper_tcp6.c:301:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[128]; data/scamper-20191102/scamper/scamper_udp4.c:105:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + 8, probe->pr_data, probe->pr_len); data/scamper-20191102/scamper/scamper_udp4.c:133:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[128]; data/scamper-20191102/scamper/scamper_udp4.c:228:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[32]; data/scamper-20191102/scamper/scamper_udp4.c:263:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[32]; data/scamper-20191102/scamper/scamper_udp6.c:115:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + ip6hlen + 8, probe->pr_data, probe->pr_len); data/scamper-20191102/scamper/scamper_udp6.c:141:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[128]; data/scamper-20191102/scamper/scamper_udp6.c:206:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/scamper/scamper_writebuf.c:159:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&iov[i], slist_node_item(node), sizeof(struct iovec)); data/scamper-20191102/scamper/scamper_writebuf.c:328:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((uint8_t *)wb->tail->iov_base + wb->tail->iov_len, data, x); data/scamper-20191102/scamper/sting/scamper_sting_text.c:45:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[192], src[64], dst[64]; data/scamper-20191102/scamper/tbit/scamper_tbit.c:157:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c, pktptr+2, *l); data/scamper-20191102/scamper/tbit/scamper_tbit.c:164:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(c, pktptr+4, *l); data/scamper-20191102/scamper/tbit/scamper_tbit_do.c:421:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[64], buf[16]; data/scamper-20191102/scamper/tbit/scamper_tbit_do.c:851:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data+off, frag->data, frag->datalen); data/scamper-20191102/scamper/tbit/scamper_tbit_do.c:1123:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/scamper-20191102/scamper/tbit/scamper_tbit_do.c:1152:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/scamper-20191102/scamper/tbit/scamper_tbit_do.c:3724:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pr->pr_tcp_sack, tp->tp_sack, 32); data/scamper-20191102/scamper/tbit/scamper_tbit_json.c:92:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024], tmp[128], *str; data/scamper-20191102/scamper/tbit/scamper_tbit_json.c:218:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024], tmp[128]; data/scamper-20191102/scamper/tbit/scamper_tbit_json.c:483:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, header, header_len); wc += header_len; data/scamper-20191102/scamper/tbit/scamper_tbit_json.c:484:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, ", \"pkts\":[", 10); wc += 10; data/scamper-20191102/scamper/tbit/scamper_tbit_json.c:489:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, ", ", 2); data/scamper-20191102/scamper/tbit/scamper_tbit_json.c:492:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, pkts[i], pkt_lens[i]); data/scamper-20191102/scamper/tbit/scamper_tbit_json.c:495:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+wc, "]}\n", 3); wc += 3; data/scamper-20191102/scamper/tbit/scamper_tbit_text.c:53:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[131072], *str; data/scamper-20191102/scamper/tbit/scamper_tbit_text.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src[64], dst[64], tmp[256], ipid[12], fstr[32], tfstr[32], sack[128]; data/scamper-20191102/scamper/tbit/scamper_tbit_warts.c:750:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + *off, cookie, *count); data/scamper-20191102/scamper/tbit/scamper_tbit_warts.c:764:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out+1, buf + *off, cookielen); data/scamper-20191102/scamper/trace/scamper_trace_do.c:3749:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(probe.pr_data, trace->payload, trace->payload_len); data/scamper-20191102/scamper/trace/scamper_trace_do.c:3795:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(probe.pr_data, &u16, 2); data/scamper-20191102/scamper/trace/scamper_trace_do.c:3813:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(probe.pr_data, &u16, 2); data/scamper-20191102/scamper/trace/scamper_trace_do.c:3818:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(probe.pr_data, &u16, 2); data/scamper-20191102/scamper/trace/scamper_trace_json.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024], tmp[128]; data/scamper-20191102/scamper/trace/scamper_trace_json.c:137:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512], tmp[64]; data/scamper-20191102/scamper/trace/scamper_trace_text.c:192:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src[64], dst[64], header[192]; data/scamper-20191102/scamper/trace/scamper_trace_text.c:227:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_hop[256]; data/scamper-20191102/scamper/trace/scamper_trace_text.c:228:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_addr[64]; data/scamper-20191102/scamper/trace/scamper_trace_text.c:229:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_rtt[24]; data/scamper-20191102/scamper/trace/scamper_trace_text.c:230:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_icmp[128]; data/scamper-20191102/scamper/trace/scamper_trace_text.c:297:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str_addrs[i], str_addr, len+1); data/scamper-20191102/scamper/trace/scamper_trace_text.c:360:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+len, str_rtts[i], len_rtts[i]); data/scamper-20191102/scamper/trace/scamper_trace_text.c:367:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+len, str_addrs[i], len_addrs[i]); data/scamper-20191102/scamper/trace/scamper_trace_text.c:370:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str+len, str_rtts[i], len_rtts[i]); data/scamper-20191102/scamper/trace/scamper_trace_text.c:405:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[24]; data/scamper-20191102/scamper/trace/scamper_trace_text.c:506:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], addr[128]; data/scamper-20191102/scamper/tracelb/scamper_tracelb.c:861:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(trace->nodes, nodes, trace->nodec*sizeof(scamper_tracelb_node_t *)); data/scamper-20191102/scamper/tracelb/scamper_tracelb_do.c:500:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096], addr[64]; data/scamper-20191102/scamper/tracelb/scamper_tracelb_do.c:560:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], addr[64]; data/scamper-20191102/scamper/tracelb/scamper_tracelb_do.c:2504:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char from[64], to[64]; data/scamper-20191102/scamper/tracelb/scamper_tracelb_do.c:2972:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f[64], t[64]; data/scamper-20191102/scamper/tracelb/scamper_tracelb_do.c:4229:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(probe.pr_data, &u16, 2); data/scamper-20191102/scamper/tracelb/scamper_tracelb_do.c:4239:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(probe.pr_data, &u16, 2); data/scamper-20191102/scamper/tracelb/scamper_tracelb_do.c:4251:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(probe.pr_data, &u16, 2); data/scamper-20191102/scamper/tracelb/scamper_tracelb_do.c:4256:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(probe.pr_data, &u16, 2); data/scamper-20191102/scamper/tracelb/scamper_tracelb_json.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512], tmp[128]; data/scamper-20191102/scamper/tracelb/scamper_tracelb_json.c:94:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2048], tmp[256]; data/scamper-20191102/scamper/tracelb/scamper_tracelb_json.c:131:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/scamper/tracelb/scamper_tracelb_json.c:231:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128], tmp[64], *dup = NULL; data/scamper-20191102/scamper/tracelb/scamper_tracelb_json.c:308:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2048], tmp[512], *dup = NULL; data/scamper-20191102/scamper/tracelb/scamper_tracelb_text.c:45:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst[64]; data/scamper-20191102/scamper/tracelb/scamper_tracelb_text.c:78:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024], src[64], dst[64]; data/scamper-20191102/utils.c:79:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addr, addr_in, size); data/scamper-20191102/utils.c:97:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addr, sa, (size_t)len); data/scamper-20191102/utils.c:118:24: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if(addr != NULL) memcpy(&sin4->sin_addr, addr, sizeof(struct in_addr)); data/scamper-20191102/utils.c:126:24: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if(addr != NULL) memcpy(&sin6->sin6_addr, addr, sizeof(struct in6_addr)); data/scamper-20191102/utils.c:229:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+off, sdl->sdl_data, sdl->sdl_nlen); data/scamper-20191102/utils.c:260:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[128]; data/scamper-20191102/utils.c:441:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, ptr, len); data/scamper-20191102/utils.c:882:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, sizeof(struct timeval)); data/scamper-20191102/utils.c:1382:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(((uint8_t *)dst) + *off, src, len); data/scamper-20191102/utils.c:1427:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&u16, bytes, 2); data/scamper-20191102/utils.c:1434:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&u32, bytes, 4); data/scamper-20191102/utils.c:1441:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bytes, &tmp, 2); data/scamper-20191102/utils.c:1448:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bytes, &tmp, 4); data/scamper-20191102/utils.c:2245:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((fd = open(filename, O_RDONLY)) < 0) data/scamper-20191102/utils.c:2254:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sp[8]; data/scamper-20191102/utils.h:74:26: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define memdup(ptr, len) memcpy(malloc(len), ptr, len) data/scamper-20191102/utils/sc_ally/sc_ally.c:462:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((text = fopen(opt_text, "w")) == NULL) data/scamper-20191102/utils/sc_ally/sc_ally.c:493:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512]; data/scamper-20191102/utils/sc_ally/sc_ally.c:513:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pref[32]; data/scamper-20191102/utils/sc_ally/sc_ally.c:514:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512]; data/scamper-20191102/utils/sc_ally/sc_ally.c:1237:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[64], icmp[10], tcp[10], udp[10]; data/scamper-20191102/utils/sc_ally/sc_ally.c:1290:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512]; data/scamper-20191102/utils/sc_ally/sc_ally.c:1291:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/scamper-20191102/utils/sc_ally/sc_ally.c:1346:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/scamper-20191102/utils/sc_ally/sc_ally.c:1414:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/scamper-20191102/utils/sc_ally/sc_ally.c:1483:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ab[64], bb[64]; data/scamper-20191102/utils/sc_ally/sc_ally.c:1559:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[512]; data/scamper-20191102/utils/sc_ally/sc_ally.c:1622:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((outfile_fd = open(outfile_name, flags, mode)) == -1) data/scamper-20191102/utils/sc_ally/sc_ally.c:1907:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/scamper-20191102/utils/sc_ally/sc_ally.c:1938:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ab[64], bb[64]; data/scamper-20191102/utils/sc_ally/sc_ally.c:1966:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[64], b[64]; data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c:99:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opts[48]; data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c:103:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(opts, "gG:"); data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c:113:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). skip_numlines = atoi(optarg); data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c:118:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). debug_numlines = atoi(optarg); data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c:278:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64], buf2[64], buf3[256]; data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c:493:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c:518:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rtt[64]; data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c:571:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src[256], dst[256], rtt[256]; data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c:586:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rtt[128], addr[128]; data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c:629:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], path_complete; data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c:739:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_analysis_dump/sc_analysis_dump.c:794:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_attach/sc_attach.c:363:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((outfile_fd = open(outfile_name, flags, mode)) == -1) data/scamper-20191102/utils/sc_attach/sc_attach.c:567:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:597:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cmd[32768]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:1224:39: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if(logfile_fn != NULL && (logfile = fopen(logfile_fn, "w")) == NULL) data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:1248:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[131072]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:1272:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[131072]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:1885:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:1970:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:3320:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64], buf2[64]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:3732:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128], rtt[128]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:3787:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:3836:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:3966:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[128], b[128]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:4038:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst[64]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:4055:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ab[64], bb[64]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:4150:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ab[64], bb[64]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:4304:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[32], b[32], ab[32]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:4387:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[384], ab[32], bb[32]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:4742:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[256], buf[128]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:4787:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:4815:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:5036:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:5057:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(readbuf+readbuf_len, buf, rc); data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:5414:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). u32 = atoi(a); data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:5700:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(in, &nest->pfx->pfx.v6->net, sizeof(struct in6_addr)); data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:5706:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&x, &nest->pfx->pfx.v6->net, sizeof(struct in6_addr)); data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:5711:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&y, &nest2->pfx->pfx.v6->net, sizeof(struct in6_addr)); data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:5714:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(in, &x, sizeof(struct in6_addr)); data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:5722:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&f, &nest->pfx->pfx.v6->net, sizeof(struct in6_addr)); data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:5726:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(in, &x, sizeof(struct in6_addr)); data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:7806:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_erosprober/sc_erosprober.c:265:26: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). else if((logfile = fopen(opt_log, "w")) == NULL) data/scamper-20191102/utils/sc_erosprober/sc_erosprober.c:278:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[131072]; data/scamper-20191102/utils/sc_erosprober/sc_erosprober.c:438:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_erosprober/sc_erosprober.c:539:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[256], buf[128]; data/scamper-20191102/utils/sc_filterpolicy/sc_filterpolicy.c:462:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((logfile = fopen(opt_log, "w")) == NULL) data/scamper-20191102/utils/sc_filterpolicy/sc_filterpolicy.c:491:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[131072]; data/scamper-20191102/utils/sc_filterpolicy/sc_filterpolicy.c:698:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fsaddr[30], buf[128]; data/scamper-20191102/utils/sc_filterpolicy/sc_filterpolicy.c:917:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128], cmd[512]; data/scamper-20191102/utils/sc_filterpolicy/sc_filterpolicy.c:1168:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_filterpolicy/sc_filterpolicy.c:1213:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_filterpolicy/sc_filterpolicy.c:1274:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:209:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[32]; /* the character for the nibble */ data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:260:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2048]; /* regex built so far */ data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:769:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[4]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:778:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+off, tmp, r + 1); off += r; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:1448:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:1457:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, &S[pt->S_start], pt->S_end - pt->S_start + 1); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:1964:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp->css, eval_p, len); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:2090:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(css->css+css->len, &S[pt->S_start], pt->S_end - pt->S_start + 1); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:2234:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(out->css+out->len, ifd->label+l, r - l + 1); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:2571:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(css->css + css->len, dup, len); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:2692:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512], tmp[8]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:2759:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+off, tmp, r); off += r; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:2810:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+off, tmp, r); off += r; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:3112:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(css->css+off, iface->name + rew->ovector[2*i], l); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:3321:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:3335:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, ptr, c); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:3369:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:3386:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, ptr, c); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:3906:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], *dup = NULL; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:4334:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *so[200][2]; /* string offsets */ data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:4340:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:4448:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:4756:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(best, cp, sizeof(sc_charpos_t)); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:4801:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c, *ptr, buf[256]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:5173:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(css->css, ifd->label, len+1); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:5220:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(css->css+off, ifd->label, ip_s); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:5226:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(css->css+off, ifd->label + ip_e + 1, len - ip_e - 1); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:5253:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ifd->label, iface->name, len-1); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:6735:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[8]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:6746:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf + *to, tmp, r + 1); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:6771:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[8]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:6800:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+to, tmp, r); to += r; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:6827:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[8]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:6860:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+to, tmp, r); to += r; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:6872:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+to, tmp, r); to += r; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:6890:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+to, tmp, r); to += r; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:6953:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[8]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:6987:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+to, tmp, r); to += r; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:6998:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+to, tmp, r); to += r; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7034:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[8]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7053:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+to, tmp, r); to += r; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7076:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[8]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7106:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+to, tmp, r); to += r; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7132:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[8]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7163:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+to, tmp, r); to += r; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7204:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[8]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7249:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+to, tmp, r); to += r; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7274:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[8]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7305:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+to, tmp, r); to += r; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7327:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rb->buf, buf, off); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7377:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2048], tmp[2048]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7460:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+off, tmp, to); off += to; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7481:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+off, tmp, r); off += r; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7493:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+off, dom->escape, dom->escapel); off += dom->escapel; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7835:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1024]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7877:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:7924:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2048]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:8306:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:8659:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:9119:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:9579:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+off, ss->seg, segl + 1); off += segl; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:10013:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], rebuf[256], *ptr = NULL; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:10178:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(LAa, La, Lc * 2 * sizeof(int)); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:10410:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:10795:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256], *str; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:11571:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024], score[128]; data/scamper-20191102/utils/sc_ipiddump/sc_ipiddump.c:459:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char probe_src[128], addr[128], ipid[10]; data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:333:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((text = fopen(opt_log, "w")) == NULL) data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:377:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512]; data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:397:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pref[32]; data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:398:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512]; data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:710:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[64], icmp[10], tcp[10], udp[10]; data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:832:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[64], b[64], ab[64]; data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:871:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:915:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[64], b[64], *meth; data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:983:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[512]; data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:1192:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((outfile_fd = open(outfile_name, flags, mode)) == -1) data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:1228:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:1458:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[64], b[64], ab[64]; data/scamper-20191102/utils/sc_radargun/sc_radargun.c:491:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((logfile = fopen(opt_logfile, "w")) == NULL) data/scamper-20191102/utils/sc_radargun/sc_radargun.c:519:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512]; data/scamper-20191102/utils/sc_radargun/sc_radargun.c:547:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pref[32]; data/scamper-20191102/utils/sc_radargun/sc_radargun.c:548:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[512]; data/scamper-20191102/utils/sc_radargun/sc_radargun.c:599:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_radargun/sc_radargun.c:684:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_radargun/sc_radargun.c:800:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[256]; data/scamper-20191102/utils/sc_radargun/sc_radargun.c:801:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/scamper-20191102/utils/sc_radargun/sc_radargun.c:826:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256], buf[64], header[128]; data/scamper-20191102/utils/sc_radargun/sc_radargun.c:1165:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/scamper-20191102/utils/sc_radargun/sc_radargun.c:1269:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/scamper-20191102/utils/sc_radargun/sc_radargun.c:1289:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(readbuf+readbuf_len, buf, rc); data/scamper-20191102/utils/sc_radargun/sc_radargun.c:1549:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((outfile_fd = open(outfile_name, flags, mode)) == -1) data/scamper-20191102/utils/sc_radargun/sc_radargun.c:1811:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[32], b[32]; data/scamper-20191102/utils/sc_radargun/sc_radargun.c:1968:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/scamper-20191102/utils/sc_radargun/sc_radargun.c:2045:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[10]; data/scamper-20191102/utils/sc_remoted/sc_remoted.c:443:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[512], ts[16]; data/scamper-20191102/utils/sc_remoted/sc_remoted.c:794:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sab[128], filename[65535], tmp[512]; data/scamper-20191102/utils/sc_remoted/sc_remoted.c:931:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(resp+8, sab, off + 1); data/scamper-20191102/utils/sc_remoted/sc_remoted.c:1050:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ms->buf + ms->buf_offset, buf+off, y); data/scamper-20191102/utils/sc_remoted/sc_remoted.c:1056:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ms->buf + ms->buf_offset, buf+off, x); data/scamper-20191102/utils/sc_remoted/sc_remoted.c:1258:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[65535]; data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:302:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostname[255+1]; data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:439:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((aliasfile = fopen(opt_aliasfile, "a")) == NULL) data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:474:23: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). else if((logfile = fopen(opt_log, "w")) == NULL) data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:535:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[131072]; data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:778:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:851:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:1202:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[64], buf[131072]; data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:1637:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:1700:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:1710:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:1815:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:1854:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[192], addr[64]; data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:1950:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[64]; data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:2319:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:2364:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[64], b[64], r[16]; data/scamper-20191102/utils/sc_tbitblind/sc_tbitblind.c:67:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cmd[512]; data/scamper-20191102/utils/sc_tbitblind/sc_tbitblind.c:247:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((text = fopen(opt_text, "w")) == NULL) data/scamper-20191102/utils/sc_tbitblind/sc_tbitblind.c:288:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((comp = fopen(opt_comp, "a")) == NULL) data/scamper-20191102/utils/sc_tbitblind/sc_tbitblind.c:302:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time[32], msg[512]; data/scamper-20191102/utils/sc_tbitblind/sc_tbitblind.c:380:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[128]; data/scamper-20191102/utils/sc_tbitblind/sc_tbitblind.c:576:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/scamper-20191102/utils/sc_tbitblind/sc_tbitblind.c:596:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(readbuf+readbuf_len, buf, rc); data/scamper-20191102/utils/sc_tbitblind/sc_tbitblind.c:763:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_tbitblind/sc_tbitblind.c:811:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:111:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char command_buf[512]; data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:397:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((text = fopen(opt_text, "w")) == NULL) data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:407:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((comp = fopen(opt_comp, "a")) == NULL) data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:439:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char time[32], msg[512]; data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:636:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[128]; data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:748:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi(pos); data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:793:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tu->size = atoi(size); data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:840:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:860:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(readbuf+readbuf_len, buf, rc); data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:1038:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:1104:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:1411:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). u32 = atoi(a); data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:1604:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:1794:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_tracediff/sc_tracediff.c:147:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[128]; data/scamper-20191102/utils/sc_tracediff/sc_tracediff.c:310:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fs[32], a[256], b[256]; data/scamper-20191102/utils/sc_tracediff/sc_tracediff.c:426:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_ttlexp/sc_ttlexp.c:96:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[128]; data/scamper-20191102/utils/sc_uptime/sc_uptime.c:494:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((logfile = fopen(opt_log, "w")) == NULL) data/scamper-20191102/utils/sc_uptime/sc_uptime.c:508:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[131072]; data/scamper-20191102/utils/sc_uptime/sc_uptime.c:584:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[256], buf[128]; data/scamper-20191102/utils/sc_uptime/sc_uptime.c:702:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_uptime/sc_uptime.c:898:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_uptime/sc_uptime.c:1177:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_uptime/sc_uptime.c:1227:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_uptime/sc_uptime.c:2053:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_uptime/sc_uptime.c:2997:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_warts2csv/sc_warts2csv.c:45:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src[128], dst[128], addr[128], rtt[32], type[32], stop[32]; data/scamper-20191102/utils/sc_warts2pcap/sc_warts2pcap.c:329:24: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((outfile_fd = fopen(outfile_name, "w")) == NULL) data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:145:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:146:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, ctime(&tt), 24); buf[24] = '\0'; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:157:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[256]; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:248:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:472:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char from[32]; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:549:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src[256], dst[256]; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:682:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:780:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:924:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst[128], src[128]; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:986:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:1169:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char a[64], b[64]; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:1274:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src[64], dst[64], buf[128], ipid[12], fstr[32], tfstr[32], sack[64]; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:1605:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src[64], dst[64], buf[32], ipid[12], tfstr[32], *dir; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:1753:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char src[64], dst[64], buf[32], *str; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:1828:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:1879:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:1958:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:1965:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, ctime(&tt), 24); buf[24] = '\0'; data/scamper-20191102/utils/sc_wartsdump/sc_wartsdump.c:1984:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/scamper-20191102/utils/sc_wartsfix/sc_wartsfix.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char offs[16]; data/scamper-20191102/utils/sc_wartsfix/sc_wartsfix.c:67:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((in = open(argv[1], O_RDONLY)) < 0) data/scamper-20191102/utils/sc_wartsfix/sc_wartsfix.c:78:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if((out = open(fixname, O_WRONLY | O_TRUNC | O_CREAT | O_EXCL, mode)) < 0) data/scamper-20191102/utils/sc_wartsfix/sc_wartsfix.c:101:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&u16, hdr, 2); u16 = ntohs(u16); data/scamper-20191102/utils/sc_wartsfix/sc_wartsfix.c:108:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&u32, hdr+4, 4); u32 = ntohl(u32); data/scamper-20191102/utils/sc_wartsfix/sc_wartsfix.c:117:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp, hdr, 8); data/scamper-20191102/internal.h:256:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define read _read data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:299:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). reply_lens[i] = strlen(replies[i]); data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:360:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (header_len = strlen(header)); data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:373:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pd_lens[i] = strlen(pds[i]); data/scamper-20191102/scamper/dealias/scamper_dealias_json.c:390:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pr_lens[j] = strlen(prs[j]); data/scamper-20191102/scamper/dealias/scamper_dealias_text.c:66:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). write_wrap(fd, buf, NULL, strlen(buf)); data/scamper-20191102/scamper/dealias/scamper_dealias_warts.c:1567:22: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). static int (*const read[])(scamper_dealias_t *,warts_state_t *, data/scamper-20191102/scamper/dealias/scamper_dealias_warts.c:1617:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if(read[dealias->method-1](dealias, state, table, &defs, &defc, data/scamper-20191102/scamper/ping/scamper_ping_do.c:1636:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(opt->str); data/scamper-20191102/scamper/ping/scamper_ping_json.c:320:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (header_len = strlen(header)); data/scamper-20191102/scamper/ping/scamper_ping_json.c:340:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += (reply_lens[j] = strlen(replies[j])); data/scamper-20191102/scamper/ping/scamper_ping_json.c:349:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += (stats_len = strlen(stats)); data/scamper-20191102/scamper/ping/scamper_ping_text.c:213:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (header_len = strlen(header)); data/scamper-20191102/scamper/ping/scamper_ping_text.c:232:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += (reply_lens[j] = strlen(replies[j])); data/scamper-20191102/scamper/ping/scamper_ping_text.c:242:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += (stats_len = strlen(stats)); data/scamper-20191102/scamper/scamper.c:363:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(mc->cmd) + 1; data/scamper-20191102/scamper/scamper.c:366:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(argv[i]) + 1; data/scamper-20191102/scamper/scamper.c:373:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). off = strlen(mc->cmd); data/scamper-20191102/scamper/scamper.c:378:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmp = strlen(argv[i]); data/scamper-20191102/scamper/scamper.c:485:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t argv0 = strlen(argv[0]); data/scamper-20191102/scamper/scamper.c:492:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(multicall[m].argv0); data/scamper-20191102/scamper/scamper.c:1043:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/scamper-20191102/scamper/scamper_control.c:327:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "off", len); data/scamper-20191102/scamper/scamper_control.c:329:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "on", len); data/scamper-20191102/scamper/scamper_control.c:1106:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/scamper-20191102/scamper/scamper_control.c:2150:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rrc = read(fd, buf, sizeof(buf))) < 0) data/scamper-20191102/scamper/scamper_control.c:2886:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(monitorname) > 254) data/scamper-20191102/scamper/scamper_control.c:2899:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = 1 + 1 + 8 + 1 + (monitorname != NULL ? strlen(monitorname) + 1 : 0); data/scamper-20191102/scamper/scamper_control.c:2907:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(monitorname) + 1; data/scamper-20191102/scamper/scamper_control.c:2940:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rrc = read(fd, buf, sizeof(buf))) < 0) data/scamper-20191102/scamper/scamper_dl.c:938:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while((len = read(fd, buf, node->readbuf_len)) == -1) data/scamper-20191102/scamper/scamper_dl.c:1241:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(ifname, "/dev/", sizeof(ifname)); data/scamper-20191102/scamper/scamper_dl.c:1490:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(ifname, "<null>", sizeof(ifname)-1); data/scamper-20191102/scamper/scamper_fds.c:82:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). scamper_fd_poll_t read; /* if monitored for read events */ data/scamper-20191102/scamper/scamper_fds.c:336:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if(fdn->read.node != NULL) data/scamper-20191102/scamper/scamper_fds.c:337:25: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). dlist_node_pop(fdn->read.list, fdn->read.node); data/scamper-20191102/scamper/scamper_fds.c:337:41: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). dlist_node_pop(fdn->read.list, fdn->read.node); data/scamper-20191102/scamper/scamper_fds.c:390:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (fdn->read.list != NULL && dlist_islocked(fdn->read.list) != 0) || data/scamper-20191102/scamper/scamper_fds.c:390:54: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (fdn->read.list != NULL && dlist_islocked(fdn->read.list) != 0) || data/scamper-20191102/scamper/scamper_fds.c:652:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fd->read.cb(fd->fd, fd->read.param); data/scamper-20191102/scamper/scamper_fds.c:652:30: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fd->read.cb(fd->fd, fd->read.param); data/scamper-20191102/scamper/scamper_fds.c:686:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((fd->read.flags & SCAMPER_FD_POLL_FLAG_INACTIVE) != 0 && data/scamper-20191102/scamper/scamper_fds.c:705:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((fd->read.flags & SCAMPER_FD_POLL_FLAG_INACTIVE) == 0) data/scamper-20191102/scamper/scamper_fds.c:824:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdp->read.cb(fd, fdp->read.param); data/scamper-20191102/scamper/scamper_fds.c:824:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdp->read.cb(fd, fdp->read.param); data/scamper-20191102/scamper/scamper_fds.c:858:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (fd->read.flags & SCAMPER_FD_POLL_FLAG_INACTIVE) == 0))) data/scamper-20191102/scamper/scamper_fds.c:870:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (fd->read.flags & SCAMPER_FD_POLL_FLAG_INACTIVE) == 0) data/scamper-20191102/scamper/scamper_fds.c:941:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdp->read.cb(fd, fdp->read.param); data/scamper-20191102/scamper/scamper_fds.c:941:26: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdp->read.cb(fd, fdp->read.param); data/scamper-20191102/scamper/scamper_fds.c:1048:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((fdn->read.node = dlist_node_alloc(&fdn->read)) == NULL) data/scamper-20191102/scamper/scamper_fds.c:1048:47: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((fdn->read.node = dlist_node_alloc(&fdn->read)) == NULL) data/scamper-20191102/scamper/scamper_fds.c:1052:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdn->read.fdn = fdn; data/scamper-20191102/scamper/scamper_fds.c:1053:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdn->read.flags = SCAMPER_FD_POLL_FLAG_INACTIVE; data/scamper-20191102/scamper/scamper_fds.c:1420:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if(kq != -1 && (fdn->read.flags & SCAMPER_FD_POLL_FLAG_INACTIVE) == 0) data/scamper-20191102/scamper/scamper_fds.c:1425:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if(ep != -1 && (fdn->read.flags & SCAMPER_FD_POLL_FLAG_INACTIVE) == 0) data/scamper-20191102/scamper/scamper_fds.c:1429:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdn->read.flags |= SCAMPER_FD_POLL_FLAG_INACTIVE; data/scamper-20191102/scamper/scamper_fds.c:1441:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). assert(fdn->read.cb != NULL); data/scamper-20191102/scamper/scamper_fds.c:1443:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((fdn->read.flags & SCAMPER_FD_POLL_FLAG_INACTIVE) != 0) data/scamper-20191102/scamper/scamper_fds.c:1445:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdn->read.flags &= ~(SCAMPER_FD_POLL_FLAG_INACTIVE); data/scamper-20191102/scamper/scamper_fds.c:1461:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if(fdn->read.list != read_fds) data/scamper-20191102/scamper/scamper_fds.c:1463:42: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). dlist_node_head_push(read_queue, fdn->read.node); data/scamper-20191102/scamper/scamper_fds.c:1464:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdn->read.list = read_queue; data/scamper-20191102/scamper/scamper_fds.c:1533:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdn->read.cb = cb; data/scamper-20191102/scamper/scamper_fds.c:1534:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdn->read.param = param; data/scamper-20191102/scamper/scamper_fds.c:1552:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdn->read.cb = scamper_icmp4_read_cb; data/scamper-20191102/scamper/scamper_fds.c:1565:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdn->read.cb = scamper_icmp6_read_cb; data/scamper-20191102/scamper/scamper_fds.c:1579:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdn->read.cb = scamper_rtsock_read_cb; data/scamper-20191102/scamper/scamper_fds.c:1674:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdn->read.cb = scamper_dl_read_cb; data/scamper-20191102/scamper/scamper_fds.c:1675:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdn->read.param = fdn->fd_dl_dl; data/scamper-20191102/scamper/scamper_fds.c:1734:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdn->read.cb = read_cb; data/scamper-20191102/scamper/scamper_fds.c:1735:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fdn->read.param = param; data/scamper-20191102/scamper/scamper_file.c:114:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int (*read)(scamper_file_t *sf, scamper_file_filter_t *filter, data/scamper-20191102/scamper/scamper_file.c:418:58: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if(sf->type != SCAMPER_FILE_NONE && handlers[sf->type].read != NULL) data/scamper-20191102/scamper/scamper_file.c:420:33: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return handlers[sf->type].read(sf, filter, type, object); data/scamper-20191102/scamper/scamper_file.c:620:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, handlers[sf->type].type, len); data/scamper-20191102/scamper/scamper_file_warts.c:187:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen(str) + 1; data/scamper-20191102/scamper/scamper_file_warts.c:769:45: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). handler = &handlers[id]; assert(handler->read != NULL); data/scamper-20191102/scamper/scamper_file_warts.c:770:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if(handler->read(buf, off, len, handler->data, handler->param) == -1) data/scamper-20191102/scamper/scamper_file_warts.c:1340:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_len = strlen(list->name) + 1; data/scamper-20191102/scamper/scamper_file_warts.h:156:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). wpr_t read; data/scamper-20191102/scamper/scamper_firewall.c:841:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((len = strlen(name)) == 0 || string_isprint(name, len) == 0) data/scamper-20191102/scamper/scamper_firewall.c:903:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pfte.anchor, anchor, sizeof(pfte.anchor)-1); data/scamper-20191102/scamper/scamper_firewall.c:920:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pfr.anchor, anchor, sizeof(pfr.anchor)-1); data/scamper-20191102/scamper/scamper_firewall.c:1054:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(name_str) < 1) data/scamper-20191102/scamper/scamper_if.c:92:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(ifname) + 1 > len) data/scamper-20191102/scamper/scamper_if.c:98:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str, ifname, len); data/scamper-20191102/scamper/scamper_if.c:228:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(ifname, "/dev/", sizeof(ifname)); data/scamper-20191102/scamper/scamper_privsep.c:440:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(name[plen] != '\0' || strlen(name) + 1 != plen) data/scamper-20191102/scamper/scamper_privsep.c:1012:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(file) + 1; data/scamper-20191102/scamper/scamper_privsep.c:1026:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = sizeof(flags) + strlen(file) + 1; data/scamper-20191102/scamper/scamper_privsep.c:1097:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(file) + 1; data/scamper-20191102/scamper/scamper_privsep.c:1156:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(anchor) + 1; data/scamper-20191102/scamper/scamper_privsep.c:1316:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memset(pw->pw_passwd, 0, strlen(pw->pw_passwd)); data/scamper-20191102/scamper/scamper_source_cmdline.c:46:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t addrlen = strlen(addr); data/scamper-20191102/scamper/scamper_source_cmdline.c:98:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cmd_len = strlen(cmd); data/scamper-20191102/scamper/scamper_source_file.c:194:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); data/scamper-20191102/scamper/scamper_source_file.c:247:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rc = read(fd, buf, sizeof(buf))) > 0) data/scamper-20191102/scamper/scamper_source_file.c:537:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ssf->command_len = strlen(ssf->command); data/scamper-20191102/scamper/scamper_source_tsps.c:203:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rc = read(fd, buf, sizeof(buf))) > 0) data/scamper-20191102/scamper/sting/scamper_sting_text.c:56:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/scamper-20191102/scamper/sting/scamper_sting_text.c:70:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/scamper-20191102/scamper/tbit/scamper_tbit_do.c:3964:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmp = strlen(param); data/scamper-20191102/scamper/tbit/scamper_tbit_json.c:471:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pkt_lens[i] = strlen(pkts[i]); data/scamper-20191102/scamper/tbit/scamper_tbit_json.c:478:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += (header_len = strlen(header)); data/scamper-20191102/scamper/trace/scamper_trace_do.c:3969:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((strlen(param) % 2) != 0) data/scamper-20191102/scamper/trace/scamper_trace_do.c:4180:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(opt->str); data/scamper-20191102/scamper/trace/scamper_trace_json.c:186:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(header); data/scamper-20191102/scamper/trace/scamper_trace_json.c:203:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(hops[j]); data/scamper-20191102/scamper/trace/scamper_trace_text.c:294:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str_addr); data/scamper-20191102/scamper/trace/scamper_trace_text.c:306:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str_rtt) + 3 + strlen(str_icmp); data/scamper-20191102/scamper/trace/scamper_trace_text.c:306:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str_rtt) + 3 + strlen(str_icmp); data/scamper-20191102/scamper/trace/scamper_trace_text.c:351:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); spare = -1; data/scamper-20191102/scamper/trace/scamper_trace_text.c:672:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(header) + 2; data/scamper-20191102/scamper/trace/scamper_trace_text.c:683:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(hops[i]); data/scamper-20191102/scamper/trace/scamper_trace_text.c:698:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(mtus[i]); data/scamper-20191102/scamper/tracelb/scamper_tracelb_json.c:162:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(rxs[j]); data/scamper-20191102/scamper/tracelb/scamper_tracelb_json.c:168:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(buf); data/scamper-20191102/scamper/tracelb/scamper_tracelb_json.c:221:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *off += strlen(str); data/scamper-20191102/scamper/tracelb/scamper_tracelb_json.c:463:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(header); data/scamper-20191102/scamper/tracelb/scamper_tracelb_json.c:478:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(nodes[nodec]); data/scamper-20191102/scamper/tracelb/scamper_tracelb_text.c:88:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/scamper-20191102/scamper/tracelb/scamper_tracelb_text.c:106:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/scamper-20191102/utils.c:145:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(file) + 1 > sizeof(sn->sun_path)) data/scamper-20191102/utils.c:1466:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((r = read(fd, buf+rc, rt-rc)) < 0) data/scamper-20191102/utils.c:2195:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while((ss = read(fd, readbuf+readbuf_off, readbuf_len-readbuf_off-1)) >= 0) data/scamper-20191102/utils/sc_ally/sc_ally.c:1778:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rc = read(scamper_fd, buf, sizeof(buf))) > 0) data/scamper-20191102/utils/sc_attach/sc_attach.c:391:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). scamper_writebuf_send(scamper_wb, command, strlen(command)); data/scamper-20191102/utils/sc_attach/sc_attach.c:416:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rc = read(stdin_fd, buf, sizeof(buf))) > 0) data/scamper-20191102/utils/sc_attach/sc_attach.c:520:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rc = read(scamper_fd, buf, sizeof(buf))) > 0) data/scamper-20191102/utils/sc_bdrmap/sc_bdrmap.c:5041:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rc = read(scamper_fd, buf, sizeof(buf))) > 0) data/scamper-20191102/utils/sc_erosprober/sc_erosprober.c:671:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rc = read(scamper_fd, buf, sizeof(buf))) > 0) data/scamper-20191102/utils/sc_filterpolicy/sc_filterpolicy.c:718:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((len = strlen(buf)) > maxaddr) data/scamper-20191102/utils/sc_filterpolicy/sc_filterpolicy.c:1428:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rc = read(scamper_fd, buf, sizeof(buf))) > 0) data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:1672:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(r == 0) r = strlen(S); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:1673:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(n == 0) n = strlen(T); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:1963:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(eval_p) + 1; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:2155:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fm.len = strlen(str) + 1; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:2267:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(in) + sc_css_strlen(css) + 1; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:2345:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(in) + strlen(lit) + 1; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:2345:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(in) + strlen(lit) + 1; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:2410:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(in) + 3; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:2468:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((out = malloc(strlen(in) + 1)) == NULL) data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:2570:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(dup); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:2713:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fm.len = strlen(buf) + 1; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:3013:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rc = pcre2_match(rew->pcre[k], (PCRE2_SPTR)str, strlen(str), 0, 0, data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:3023:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rc = pcre_exec(rew->pcre[k], rew->study[k], str, strlen(str), 0, 0, data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:3638:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(re->regexes[i]->str); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:4021:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(in) * 3; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:4321:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). iface->len = strlen(name); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:5162:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(ifd->label); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:8702:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). css_fm.len = strlen(css_fm.css) + 1; data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:9576:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). segl = strlen(ss->seg); data/scamper-20191102/utils/sc_hoiho/sc_hoiho.c:9771:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(re->regexes[0]->str) * 3; data/scamper-20191102/utils/sc_prefixscan/sc_prefixscan.c:1160:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rc = read(scamper_fd, buf, sizeof(buf))) > 0) data/scamper-20191102/utils/sc_radargun/sc_radargun.c:1274:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rc = read(scamper_fd, buf, sizeof(buf))) > 0) data/scamper-20191102/utils/sc_remoted/sc_remoted.c:926:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). off = strlen(sab); data/scamper-20191102/utils/sc_remoted/sc_remoted.c:1105:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rrc = read(ms->inet_fd.fd, buf, sizeof(buf))) < 0) data/scamper-20191102/utils/sc_remoted/sc_remoted.c:1442:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rc = read(cn->unix_fd->fd, buf, sizeof(buf))) <= 0) data/scamper-20191102/utils/sc_speedtrap/sc_speedtrap.c:2521:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rc = read(scamper_fd, buf, sizeof(buf))) > 0) data/scamper-20191102/utils/sc_tbitblind/sc_tbitblind.c:581:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rc = read(scamper_fd, buf, sizeof(buf))) > 0) data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:741:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(url) > 300) data/scamper-20191102/utils/sc_tbitpmtud/sc_tbitpmtud.c:845:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rc = read(scamper_fd, buf, sizeof(buf))) > 0) data/scamper-20191102/utils/sc_uptime/sc_uptime.c:708:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = sqlite3_prepare_v2(db, up_sql, strlen(up_sql)+1, &stmt, NULL); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:715:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sqlite3_bind_text(stmt, 1, buf, strlen(buf), SQLITE_STATIC); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:716:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sqlite3_bind_text(stmt, 2, type, strlen(type), SQLITE_STATIC); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:735:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = sqlite3_prepare_v2(db, in_sql, strlen(in_sql)+1, &stmt, NULL); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:742:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sqlite3_bind_text(stmt, 1, type, strlen(type), SQLITE_STATIC); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:743:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sqlite3_bind_text(stmt, 2, buf, strlen(buf), SQLITE_STATIC); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:781:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((x = sqlite3_prepare_v2(db,sql,strlen(sql)+1,&stmt,NULL)) != SQLITE_OK) data/scamper-20191102/utils/sc_uptime/sc_uptime.c:787:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sqlite3_bind_text(stmt, 1, type, strlen(type), SQLITE_STATIC); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:1091:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if((rc = read(scamper_fd, buf, sizeof(buf))) > 0) data/scamper-20191102/utils/sc_uptime/sc_uptime.c:1253:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sqlite3_bind_text(st_addr_i, 1, buf, strlen(buf), SQLITE_TRANSIENT); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:1428:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((x = sqlite3_prepare_v2(db,sql,strlen(sql)+1,&stmt,NULL)) != SQLITE_OK) data/scamper-20191102/utils/sc_uptime/sc_uptime.c:1462:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((x = sqlite3_prepare_v2(db,sql,strlen(sql)+1,&stmt,NULL)) != SQLITE_OK) data/scamper-20191102/utils/sc_uptime/sc_uptime.c:1547:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(sql); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:1772:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((x = sqlite3_prepare_v2(db,sql,strlen(sql)+1,&stmt,NULL)) != SQLITE_OK) data/scamper-20191102/utils/sc_uptime/sc_uptime.c:1811:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = sqlite3_prepare_v2(db, sql, strlen(sql)+1, &st_addr_i, NULL); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:1820:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = sqlite3_prepare_v2(db, sql, strlen(sql)+1, &st_addr_u, NULL); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:1875:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((x = sqlite3_prepare_v2(db,sql,strlen(sql)+1,&st_s,NULL)) != SQLITE_OK) data/scamper-20191102/utils/sc_uptime/sc_uptime.c:1882:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((x = sqlite3_prepare_v2(db,sql,strlen(sql)+1,&st_d,NULL)) != SQLITE_OK) data/scamper-20191102/utils/sc_uptime/sc_uptime.c:2082:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((x = sqlite3_prepare_v2(db,sql,strlen(sql)+1,&stmt,NULL)) != SQLITE_OK) data/scamper-20191102/utils/sc_uptime/sc_uptime.c:2118:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = sqlite3_prepare_v2(db, sql, strlen(sql)+1, &st_filename_sel, NULL); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:2126:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = sqlite3_prepare_v2(db, sql, strlen(sql)+1, &st_filename_ins, NULL); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:2134:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = sqlite3_prepare_v2(db, sql, strlen(sql)+1, &st_addr_ins, NULL); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:2142:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = sqlite3_prepare_v2(db, sql, strlen(sql)+1, &st_addr_upd, NULL); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:2152:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = sqlite3_prepare_v2(db, buf, strlen(buf)+1, &st_sample_ins, NULL); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:2181:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sqlite3_bind_text(st_filename_sel, 1, ptr, strlen(ptr), SQLITE_STATIC); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:2224:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sqlite3_bind_text(st_addr_ins,1,buf,strlen(buf),SQLITE_STATIC); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:2321:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sqlite3_bind_text(st_filename_ins, 1, ptr, strlen(ptr), SQLITE_STATIC); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:3013:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = sqlite3_prepare_v2(db, sql, strlen(sql)+1, &st, NULL); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:3025:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sqlite3_bind_text(st, 1, ptr, strlen(ptr), SQLITE_STATIC); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:3054:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = sqlite3_prepare_v2(db, sql, strlen(sql)+1, &st, NULL); data/scamper-20191102/utils/sc_uptime/sc_uptime.c:3100:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((x = sqlite3_prepare_v2(db, sql, strlen(sql)+1, &st, NULL)) != SQLITE_OK) data/scamper-20191102/utils/sc_wartsfix/sc_wartsfix.c:58:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(argv[1]); data/scamper-20191102/utils/sc_wartsfix/sc_wartsfix.c:89:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read(in, hdr, 8); data/scamper-20191102/utils/sc_wartsfix/sc_wartsfix.c:118:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read(in, tmp+8, u32); ANALYSIS SUMMARY: Hits = 915 Lines analyzed = 137106 in approximately 2.99 seconds (45833 lines/second) Physical Source Lines of Code (SLOC) = 103723 Hits@level = [0] 1692 [1] 196 [2] 655 [3] 29 [4] 32 [5] 3 Hits@level+ = [0+] 2607 [1+] 915 [2+] 719 [3+] 64 [4+] 35 [5+] 3 Hits/KSLOC@level+ = [0+] 25.1343 [1+] 8.82157 [2+] 6.93192 [3+] 0.617028 [4+] 0.337437 [5+] 0.0289232 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.