Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/ucspi-tcp-0.88/tcpserver.c Examining data/ucspi-tcp-0.88/tcprules.c Examining data/ucspi-tcp-0.88/tcprulescheck.c Examining data/ucspi-tcp-0.88/recordio.c Examining data/ucspi-tcp-0.88/argv0.c Examining data/ucspi-tcp-0.88/tcpclient.c Examining data/ucspi-tcp-0.88/mconnect-io.c Examining data/ucspi-tcp-0.88/addcr.c Examining data/ucspi-tcp-0.88/delcr.c Examining data/ucspi-tcp-0.88/fixcrio.c Examining data/ucspi-tcp-0.88/remoteinfo.h Examining data/ucspi-tcp-0.88/remoteinfo.c Examining data/ucspi-tcp-0.88/timeoutconn.h Examining data/ucspi-tcp-0.88/timeoutconn.c Examining data/ucspi-tcp-0.88/rules.h Examining data/ucspi-tcp-0.88/rules.c Examining data/ucspi-tcp-0.88/alloc.c Examining data/ucspi-tcp-0.88/alloc.h Examining data/ucspi-tcp-0.88/alloc_re.c Examining data/ucspi-tcp-0.88/auto-str.c Examining data/ucspi-tcp-0.88/auto_home.h Examining data/ucspi-tcp-0.88/buffer.c Examining data/ucspi-tcp-0.88/buffer.h Examining data/ucspi-tcp-0.88/buffer_0.c Examining data/ucspi-tcp-0.88/buffer_1.c Examining data/ucspi-tcp-0.88/buffer_2.c Examining data/ucspi-tcp-0.88/buffer_copy.c Examining data/ucspi-tcp-0.88/buffer_get.c Examining data/ucspi-tcp-0.88/buffer_put.c Examining data/ucspi-tcp-0.88/byte.h Examining data/ucspi-tcp-0.88/byte_chr.c Examining data/ucspi-tcp-0.88/byte_copy.c Examining data/ucspi-tcp-0.88/byte_cr.c Examining data/ucspi-tcp-0.88/byte_diff.c Examining data/ucspi-tcp-0.88/byte_rchr.c Examining data/ucspi-tcp-0.88/byte_zero.c Examining data/ucspi-tcp-0.88/case.h Examining data/ucspi-tcp-0.88/case_diffb.c Examining data/ucspi-tcp-0.88/case_diffs.c Examining data/ucspi-tcp-0.88/cdb.c Examining data/ucspi-tcp-0.88/cdb.h Examining data/ucspi-tcp-0.88/cdb_hash.c Examining data/ucspi-tcp-0.88/cdb_make.c Examining data/ucspi-tcp-0.88/cdb_make.h Examining data/ucspi-tcp-0.88/chkshsgr.c Examining data/ucspi-tcp-0.88/commands.c Examining data/ucspi-tcp-0.88/commands.h Examining data/ucspi-tcp-0.88/dns.h Examining data/ucspi-tcp-0.88/dns_dfd.c Examining data/ucspi-tcp-0.88/dns_domain.c Examining data/ucspi-tcp-0.88/dns_dtda.c Examining data/ucspi-tcp-0.88/dns_ip.c Examining data/ucspi-tcp-0.88/dns_ipq.c Examining data/ucspi-tcp-0.88/dns_name.c Examining data/ucspi-tcp-0.88/dns_nd.c Examining data/ucspi-tcp-0.88/dns_packet.c Examining data/ucspi-tcp-0.88/dns_random.c Examining data/ucspi-tcp-0.88/dns_rcip.c Examining data/ucspi-tcp-0.88/dns_rcrw.c Examining data/ucspi-tcp-0.88/dns_resolve.c Examining data/ucspi-tcp-0.88/dns_sortip.c Examining data/ucspi-tcp-0.88/dns_transmit.c Examining data/ucspi-tcp-0.88/dns_txt.c Examining data/ucspi-tcp-0.88/env.c Examining data/ucspi-tcp-0.88/env.h Examining data/ucspi-tcp-0.88/error.c Examining data/ucspi-tcp-0.88/error_str.c Examining data/ucspi-tcp-0.88/exit.h Examining data/ucspi-tcp-0.88/fd.h Examining data/ucspi-tcp-0.88/fd_copy.c Examining data/ucspi-tcp-0.88/fd_move.c Examining data/ucspi-tcp-0.88/fmt.h Examining data/ucspi-tcp-0.88/fmt_ulong.c Examining data/ucspi-tcp-0.88/gen_alloc.h Examining data/ucspi-tcp-0.88/gen_allocdefs.h Examining data/ucspi-tcp-0.88/getln.c Examining data/ucspi-tcp-0.88/getln.h Examining data/ucspi-tcp-0.88/getln2.c Examining data/ucspi-tcp-0.88/hier.c Examining data/ucspi-tcp-0.88/install.c Examining data/ucspi-tcp-0.88/instcheck.c Examining data/ucspi-tcp-0.88/iopause.c Examining data/ucspi-tcp-0.88/ip4.h Examining data/ucspi-tcp-0.88/ip4_fmt.c Examining data/ucspi-tcp-0.88/ip4_scan.c Examining data/ucspi-tcp-0.88/ndelay.h Examining data/ucspi-tcp-0.88/ndelay_off.c Examining data/ucspi-tcp-0.88/ndelay_on.c Examining data/ucspi-tcp-0.88/open.h Examining data/ucspi-tcp-0.88/open_read.c Examining data/ucspi-tcp-0.88/open_trunc.c Examining data/ucspi-tcp-0.88/open_write.c Examining data/ucspi-tcp-0.88/openreadclose.c Examining data/ucspi-tcp-0.88/openreadclose.h Examining data/ucspi-tcp-0.88/pathexec.h Examining data/ucspi-tcp-0.88/pathexec_env.c Examining data/ucspi-tcp-0.88/pathexec_run.c Examining data/ucspi-tcp-0.88/prot.c Examining data/ucspi-tcp-0.88/prot.h Examining data/ucspi-tcp-0.88/readclose.c Examining data/ucspi-tcp-0.88/readclose.h Examining data/ucspi-tcp-0.88/readwrite.h Examining data/ucspi-tcp-0.88/scan.h Examining data/ucspi-tcp-0.88/scan_ulong.c Examining data/ucspi-tcp-0.88/seek.h Examining data/ucspi-tcp-0.88/seek_set.c Examining data/ucspi-tcp-0.88/sgetopt.c Examining data/ucspi-tcp-0.88/sgetopt.h Examining data/ucspi-tcp-0.88/sig.c Examining data/ucspi-tcp-0.88/sig.h Examining data/ucspi-tcp-0.88/sig_block.c Examining data/ucspi-tcp-0.88/sig_catch.c Examining data/ucspi-tcp-0.88/sig_pause.c Examining data/ucspi-tcp-0.88/socket.h Examining data/ucspi-tcp-0.88/socket_accept.c Examining data/ucspi-tcp-0.88/socket_bind.c Examining data/ucspi-tcp-0.88/socket_conn.c Examining data/ucspi-tcp-0.88/socket_delay.c Examining data/ucspi-tcp-0.88/socket_listen.c Examining data/ucspi-tcp-0.88/socket_local.c Examining data/ucspi-tcp-0.88/socket_opts.c Examining data/ucspi-tcp-0.88/socket_remote.c Examining data/ucspi-tcp-0.88/socket_tcp.c Examining data/ucspi-tcp-0.88/socket_udp.c Examining data/ucspi-tcp-0.88/str.h Examining data/ucspi-tcp-0.88/str_chr.c Examining data/ucspi-tcp-0.88/str_diff.c Examining data/ucspi-tcp-0.88/str_len.c Examining data/ucspi-tcp-0.88/str_start.c Examining data/ucspi-tcp-0.88/stralloc.h Examining data/ucspi-tcp-0.88/stralloc_cat.c Examining data/ucspi-tcp-0.88/stralloc_catb.c Examining data/ucspi-tcp-0.88/stralloc_cats.c Examining data/ucspi-tcp-0.88/stralloc_copy.c Examining data/ucspi-tcp-0.88/stralloc_eady.c Examining data/ucspi-tcp-0.88/stralloc_opyb.c Examining data/ucspi-tcp-0.88/stralloc_opys.c Examining data/ucspi-tcp-0.88/stralloc_pend.c Examining data/ucspi-tcp-0.88/strerr.h Examining data/ucspi-tcp-0.88/strerr_die.c Examining data/ucspi-tcp-0.88/strerr_sys.c Examining data/ucspi-tcp-0.88/subgetopt.c Examining data/ucspi-tcp-0.88/subgetopt.h Examining data/ucspi-tcp-0.88/tai.h Examining data/ucspi-tcp-0.88/tai_pack.c Examining data/ucspi-tcp-0.88/taia.h Examining data/ucspi-tcp-0.88/taia_add.c Examining data/ucspi-tcp-0.88/taia_approx.c Examining data/ucspi-tcp-0.88/taia_frac.c Examining data/ucspi-tcp-0.88/taia_less.c Examining data/ucspi-tcp-0.88/taia_now.c Examining data/ucspi-tcp-0.88/taia_pack.c Examining data/ucspi-tcp-0.88/taia_sub.c Examining data/ucspi-tcp-0.88/taia_uint.c Examining data/ucspi-tcp-0.88/trycpp.c Examining data/ucspi-tcp-0.88/trylsock.c Examining data/ucspi-tcp-0.88/trypoll.c Examining data/ucspi-tcp-0.88/trysgact.c Examining data/ucspi-tcp-0.88/trysgprm.c Examining data/ucspi-tcp-0.88/tryshsgr.c Examining data/ucspi-tcp-0.88/trysysel.c Examining data/ucspi-tcp-0.88/tryulong32.c Examining data/ucspi-tcp-0.88/tryulong64.c Examining data/ucspi-tcp-0.88/tryvfork.c Examining data/ucspi-tcp-0.88/trywaitp.c Examining data/ucspi-tcp-0.88/uint16.h Examining data/ucspi-tcp-0.88/uint16_pack.c Examining data/ucspi-tcp-0.88/uint16_unpack.c Examining data/ucspi-tcp-0.88/uint32_pack.c Examining data/ucspi-tcp-0.88/uint32_unpack.c Examining data/ucspi-tcp-0.88/wait.h Examining data/ucspi-tcp-0.88/wait_nohang.c Examining data/ucspi-tcp-0.88/wait_pid.c Examining data/ucspi-tcp-0.88/x86cpuid.c Examining data/ucspi-tcp-0.88/error.h Examining data/ucspi-tcp-0.88/rblsmtpd.c FINAL RESULTS: data/ucspi-tcp-0.88/install.c:23:7: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. if (chown(home,uid,gid) == -1) data/ucspi-tcp-0.88/install.c:25:7: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(home,mode) == -1) data/ucspi-tcp-0.88/install.c:41:7: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. if (chown(subdir,uid,gid) == -1) data/ucspi-tcp-0.88/install.c:43:7: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(subdir,mode) == -1) data/ucspi-tcp-0.88/install.c:96:7: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. if (chown(file,uid,gid) == -1) data/ucspi-tcp-0.88/install.c:98:7: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(file,mode) == -1) data/ucspi-tcp-0.88/install.c:134:7: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. if (chown(file,uid,gid) == -1) data/ucspi-tcp-0.88/install.c:136:7: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(file,mode) == -1) data/ucspi-tcp-0.88/rblsmtpd.c:177:17: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt = getopt(argc,argv,"bBcCt:r:a:")) != opteof) data/ucspi-tcp-0.88/sgetopt.c:19:9: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. #define getopt sgetoptmine data/ucspi-tcp-0.88/sgetopt.c:28:5: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. int getopt(int argc,char **argv,char *opts) data/ucspi-tcp-0.88/sgetopt.h:5:9: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. #define getopt sgetoptmine data/ucspi-tcp-0.88/tcpclient.c:83:17: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt = getopt(argc,argv,"dDvqQhHrRi:p:t:T:l:")) != opteof) data/ucspi-tcp-0.88/tcpserver.c:303:17: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt = getopt(argc,argv,"dDvqQhHrR1UXx:t:u:g:l:b:B:c:pPoO")) != opteof) data/ucspi-tcp-0.88/alloc.c:9:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef union { char irrelevant[ALIGNMENT]; double d; } aligned; data/ucspi-tcp-0.88/auto-str.c:5:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bspace[256]; data/ucspi-tcp-0.88/auto-str.c:18:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char octal[4]; data/ucspi-tcp-0.88/buffer_0.c:10:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer_0_space[BUFFER_INSIZE]; data/ucspi-tcp-0.88/buffer_1.c:4:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer_1_space[BUFFER_OUTSIZE]; data/ucspi-tcp-0.88/buffer_2.c:4:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer_2_space[256]; data/ucspi-tcp-0.88/cdb.c:72:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/ucspi-tcp-0.88/cdb.c:89:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/ucspi-tcp-0.88/cdb_make.c:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/ucspi-tcp-0.88/cdb_make.c:75:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8]; data/ucspi-tcp-0.88/cdb_make.h:20:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bspace[8192]; data/ucspi-tcp-0.88/cdb_make.h:21:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char final[2048]; data/ucspi-tcp-0.88/dns.h:38:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localip[4]; data/ucspi-tcp-0.88/dns.h:39:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qtype[2]; data/ucspi-tcp-0.88/dns_dfd.c:8:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char label[63]; data/ucspi-tcp-0.88/dns_dfd.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[255]; data/ucspi-tcp-0.88/dns_dtda.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/ucspi-tcp-0.88/dns_ip.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/ucspi-tcp-0.88/dns_name.c:11:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/ucspi-tcp-0.88/dns_name.c:38:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_name4(stralloc *out,char ip[4]) data/ucspi-tcp-0.88/dns_name.c:40:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[DNS_NAME4_DOMAIN]; data/ucspi-tcp-0.88/dns_nd.c:5:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void dns_name4_domain(char name[DNS_NAME4_DOMAIN],char ip[4]) data/ucspi-tcp-0.88/dns_nd.c:5:51: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void dns_name4_domain(char name[DNS_NAME4_DOMAIN],char ip[4]) data/ucspi-tcp-0.88/dns_packet.c:42:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[255]; data/ucspi-tcp-0.88/dns_random.c:32:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void dns_random_init(char data[128]) data/ucspi-tcp-0.88/dns_random.c:36:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tpack[16]; data/ucspi-tcp-0.88/dns_rcip.c:10:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int init(char ip[64]) data/ucspi-tcp-0.88/dns_rcip.c:61:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ip[64]; /* defined if ok */ data/ucspi-tcp-0.88/dns_rcip.c:63:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_resolvconfip(char s[64]) data/ucspi-tcp-0.88/dns_rcrw.c:12:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[256]; data/ucspi-tcp-0.88/dns_resolve.c:8:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_resolve(char *q,char qtype[2]) data/ucspi-tcp-0.88/dns_resolve.c:8:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_resolve(char *q,char qtype[2]) data/ucspi-tcp-0.88/dns_resolve.c:12:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char servers[64]; data/ucspi-tcp-0.88/dns_sortip.c:10:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[4]; data/ucspi-tcp-0.88/dns_transmit.c:11:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[12]; data/ucspi-tcp-0.88/dns_transmit.c:20:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[12]; data/ucspi-tcp-0.88/dns_transmit.c:32:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[12]; data/ucspi-tcp-0.88/dns_transmit.c:194:47: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_transmit_start(struct dns_transmit *d,char servers[64],int flagrecursive,char *q,char qtype[2],char localip[4]) data/ucspi-tcp-0.88/dns_transmit.c:194:82: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_transmit_start(struct dns_transmit *d,char servers[64],int flagrecursive,char *q,char qtype[2],char localip[4]) data/ucspi-tcp-0.88/dns_transmit.c:194:90: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_transmit_start(struct dns_transmit *d,char servers[64],int flagrecursive,char *q,char qtype[2],char localip[4]) data/ucspi-tcp-0.88/dns_transmit.c:194:104: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int dns_transmit_start(struct dns_transmit *d,char servers[64],int flagrecursive,char *q,char qtype[2],char localip[4]) data/ucspi-tcp-0.88/dns_transmit.c:241:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char udpbuf[513]; data/ucspi-tcp-0.88/dns_txt.c:9:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header[12]; data/ucspi-tcp-0.88/fixcrio.c:12:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prebuf[256]; data/ucspi-tcp-0.88/fixcrio.c:15:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char leftbuf[512]; data/ucspi-tcp-0.88/fixcrio.c:21:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rightbuf[512]; data/ucspi-tcp-0.88/install.c:47:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inbuf[BUFFER_INSIZE]; data/ucspi-tcp-0.88/install.c:48:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outbuf[BUFFER_OUTSIZE]; data/ucspi-tcp-0.88/ip4_fmt.c:4:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int ip4_fmt(char *s,char ip[4]) data/ucspi-tcp-0.88/ip4_fmt.c:4:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int ip4_fmt(char *s,char ip[4]) data/ucspi-tcp-0.88/ip4_scan.c:4:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int ip4_scan(char *s,char ip[4]) data/ucspi-tcp-0.88/ip4_scan.c:4:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned int ip4_scan(char *s,char ip[4]) data/ucspi-tcp-0.88/mconnect-io.c:9:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outbuf[512]; data/ucspi-tcp-0.88/mconnect-io.c:12:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inbuf[512]; data/ucspi-tcp-0.88/open_read.c:6:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). { return open(fn,O_RDONLY | O_NDELAY); } data/ucspi-tcp-0.88/open_trunc.c:6:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). { return open(fn,O_WRONLY | O_NDELAY | O_TRUNC | O_CREAT,0644); } data/ucspi-tcp-0.88/open_write.c:6:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). { return open(fn,O_WRONLY | O_NDELAY); } data/ucspi-tcp-0.88/rblsmtpd.c:96:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strnum[FMT_ULONG]; data/ucspi-tcp-0.88/rblsmtpd.c:99:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inspace[64]; buffer in = BUFFER_INIT(read,0,inspace,sizeof inspace); data/ucspi-tcp-0.88/rblsmtpd.c:100:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outspace[1]; buffer out = BUFFER_INIT(write,1,outspace,sizeof outspace); data/ucspi-tcp-0.88/recordio.c:14:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pid[FMT_ULONG]; data/ucspi-tcp-0.88/recordio.c:16:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char recordbuf[512]; data/ucspi-tcp-0.88/recordio.c:44:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char leftbuf[256]; data/ucspi-tcp-0.88/recordio.c:49:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rightbuf[256]; data/ucspi-tcp-0.88/remoteinfo.c:48:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int doit(stralloc *out,int s,char ipremote[4],uint16 portremote,char iplocal[4],uint16 portlocal,unsigned int timeout) data/ucspi-tcp-0.88/remoteinfo.c:48:72: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int doit(stralloc *out,int s,char ipremote[4],uint16 portremote,char iplocal[4],uint16 portlocal,unsigned int timeout) data/ucspi-tcp-0.88/remoteinfo.c:51:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bspace[128]; data/ucspi-tcp-0.88/remoteinfo.c:52:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strnum[FMT_ULONG]; data/ucspi-tcp-0.88/remoteinfo.c:82:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int remoteinfo(stralloc *out,char ipremote[4],uint16 portremote,char iplocal[4],uint16 portlocal,unsigned int timeout) data/ucspi-tcp-0.88/remoteinfo.c:82:65: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int remoteinfo(stralloc *out,char ipremote[4],uint16 portremote,char iplocal[4],uint16 portlocal,unsigned int timeout) data/ucspi-tcp-0.88/sgetopt.c:41:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chp[2]; chp[0] = optproblem; chp[1] = '\n'; data/ucspi-tcp-0.88/socket_accept.c:8:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_accept4(int s,char ip[4],uint16 *port) data/ucspi-tcp-0.88/socket_bind.c:8:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_bind4(int s,char ip[4],uint16 port) data/ucspi-tcp-0.88/socket_bind.c:20:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_bind4_reuse(int s,char ip[4],uint16 port) data/ucspi-tcp-0.88/socket_conn.c:9:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_connect4(int s,char ip[4],uint16 port) data/ucspi-tcp-0.88/socket_local.c:8:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_local4(int s,char ip[4],uint16 *port) data/ucspi-tcp-0.88/socket_remote.c:8:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int socket_remote4(int s,char ip[4],uint16 *port) data/ucspi-tcp-0.88/tcpclient.c:50:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iplocal[4] = { 0,0,0,0 }; data/ucspi-tcp-0.88/tcpclient.c:54:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipremote[4]; data/ucspi-tcp-0.88/tcpclient.c:63:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strnum[FMT_ULONG]; data/ucspi-tcp-0.88/tcpclient.c:64:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ipstr[IP4_FMT]; data/ucspi-tcp-0.88/tcpclient.c:66:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char seed[128]; data/ucspi-tcp-0.88/tcprules.c:43:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strnum[FMT_ULONG]; data/ucspi-tcp-0.88/tcpserver.c:43:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localportstr[FMT_ULONG]; data/ucspi-tcp-0.88/tcpserver.c:44:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localip[4]; data/ucspi-tcp-0.88/tcpserver.c:45:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localipstr[IP4_FMT]; data/ucspi-tcp-0.88/tcpserver.c:50:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char remoteportstr[FMT_ULONG]; data/ucspi-tcp-0.88/tcpserver.c:51:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char remoteip[4]; data/ucspi-tcp-0.88/tcpserver.c:52:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char remoteipstr[IP4_FMT]; data/ucspi-tcp-0.88/tcpserver.c:56:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strnum[FMT_ULONG]; data/ucspi-tcp-0.88/tcpserver.c:57:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strnum2[FMT_ULONG]; data/ucspi-tcp-0.88/tcpserver.c:63:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bspace[16]; data/ucspi-tcp-0.88/timeoutconn.c:7:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int timeoutconn(int s,char ip[4],uint16 port,unsigned int timeout) data/ucspi-tcp-0.88/trypoll.c:9:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). x.fd = open("trypoll.c",O_RDONLY); data/ucspi-tcp-0.88/tryvfork.c:3:3: [2] (race) vfork: On some old systems, vfork() permits race conditions, and it's very difficult to use correctly (CWE-362). Use fork() instead. vfork(); data/ucspi-tcp-0.88/uint16_pack.c:3:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint16_pack(char s[2],uint16 u) data/ucspi-tcp-0.88/uint16_pack.c:9:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint16_pack_big(char s[2],uint16 u) data/ucspi-tcp-0.88/uint16_unpack.c:3:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint16_unpack(char s[2],uint16 *u) data/ucspi-tcp-0.88/uint16_unpack.c:14:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint16_unpack_big(char s[2],uint16 *u) data/ucspi-tcp-0.88/uint32_pack.c:3:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint32_pack(char s[4],uint32 u) data/ucspi-tcp-0.88/uint32_pack.c:13:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint32_pack_big(char s[4],uint32 u) data/ucspi-tcp-0.88/uint32_unpack.c:3:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint32_unpack(char s[4],uint32 *u) data/ucspi-tcp-0.88/uint32_unpack.c:18:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void uint32_unpack_big(char s[4],uint32 *u) data/ucspi-tcp-0.88/buffer_0.c:7:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return read(fd,buf,len); data/ucspi-tcp-0.88/cdb.c:55:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(c->fd,buf,len); data/ucspi-tcp-0.88/dns_transmit.c:318:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(fd,&ch,1); data/ucspi-tcp-0.88/dns_transmit.c:331:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(fd,&ch,1); data/ucspi-tcp-0.88/dns_transmit.c:349:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(fd,d->packet + d->pos,d->packetlen - d->pos); data/ucspi-tcp-0.88/fixcrio.c:75:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(0,prebuf,sizeof prebuf); data/ucspi-tcp-0.88/fixcrio.c:103:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(fdright,prebuf,sizeof prebuf); data/ucspi-tcp-0.88/install.c:69:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). buffer_init(&ssin,read,fdin,inbuf,sizeof inbuf); data/ucspi-tcp-0.88/install.c:146:3: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(077); data/ucspi-tcp-0.88/mconnect-io.c:18:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return read(fd,buf,len); data/ucspi-tcp-0.88/rblsmtpd.c:99:43: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). char inspace[64]; buffer in = BUFFER_INIT(read,0,inspace,sizeof inspace); data/ucspi-tcp-0.88/readclose.c:10:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(fd,sa->s + sa->len,bufsize); data/ucspi-tcp-0.88/readwrite.h:4:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). extern int read(); data/ucspi-tcp-0.88/recordio.c:100:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(0,leftbuf,sizeof leftbuf); data/ucspi-tcp-0.88/recordio.c:122:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). r = read(fdright,rightbuf,sizeof rightbuf); data/ucspi-tcp-0.88/remoteinfo.c:45:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return read(fd,buf,len); data/ucspi-tcp-0.88/socket_conn.c:29:5: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(s,&ch,1); /* sets errno */ ANALYSIS SUMMARY: Hits = 134 Lines analyzed = 6637 in approximately 0.20 seconds (33729 lines/second) Physical Source Lines of Code (SLOC) = 5595 Hits@level = [0] 4 [1] 17 [2] 103 [3] 6 [4] 0 [5] 8 Hits@level+ = [0+] 138 [1+] 134 [2+] 117 [3+] 14 [4+] 8 [5+] 8 Hits/KSLOC@level+ = [0+] 24.6649 [1+] 23.95 [2+] 20.9115 [3+] 2.50223 [4+] 1.42985 [5+] 1.42985 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.