Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/bsdgames-2.17/quiz/quiz.c Examining data/bsdgames-2.17/quiz/rxp.c Examining data/bsdgames-2.17/quiz/quiz.h Examining data/bsdgames-2.17/bcd/bcd.c Examining data/bsdgames-2.17/fish/fish.c Examining data/bsdgames-2.17/caesar/caesar.c Examining data/bsdgames-2.17/backgammon/backgammon/backlocal.h Examining data/bsdgames-2.17/backgammon/backgammon/extra.c Examining data/bsdgames-2.17/backgammon/backgammon/main.c Examining data/bsdgames-2.17/backgammon/backgammon/text.c Examining data/bsdgames-2.17/backgammon/backgammon/version.c Examining data/bsdgames-2.17/backgammon/backgammon/move.c Examining data/bsdgames-2.17/backgammon/teachgammon/tutor.h Examining data/bsdgames-2.17/backgammon/teachgammon/teach.c Examining data/bsdgames-2.17/backgammon/teachgammon/data.c Examining data/bsdgames-2.17/backgammon/teachgammon/tutor.c Examining data/bsdgames-2.17/backgammon/teachgammon/ttext1.c Examining data/bsdgames-2.17/backgammon/teachgammon/ttext2.c Examining data/bsdgames-2.17/backgammon/common_source/save.c Examining data/bsdgames-2.17/backgammon/common_source/fancy.c Examining data/bsdgames-2.17/backgammon/common_source/one.c Examining data/bsdgames-2.17/backgammon/common_source/board.c Examining data/bsdgames-2.17/backgammon/common_source/init.c Examining data/bsdgames-2.17/backgammon/common_source/back.h Examining data/bsdgames-2.17/backgammon/common_source/table.c Examining data/bsdgames-2.17/backgammon/common_source/odds.c Examining data/bsdgames-2.17/backgammon/common_source/subs.c Examining data/bsdgames-2.17/backgammon/common_source/check.c Examining data/bsdgames-2.17/backgammon/common_source/allow.c Examining data/bsdgames-2.17/boggle/boggle/timer.c Examining data/bsdgames-2.17/boggle/boggle/prtable.c Examining data/bsdgames-2.17/boggle/boggle/help.c Examining data/bsdgames-2.17/boggle/boggle/word.c Examining data/bsdgames-2.17/boggle/boggle/bog.c Examining data/bsdgames-2.17/boggle/boggle/extern.h Examining data/bsdgames-2.17/boggle/boggle/mach.c Examining data/bsdgames-2.17/boggle/mkindex/mkindex.c Examining data/bsdgames-2.17/boggle/mkdict/mkdict.c Examining data/bsdgames-2.17/banner/banner.c Examining data/bsdgames-2.17/include/sys/endian.h Examining data/bsdgames-2.17/include/sys/poll.h Examining data/bsdgames-2.17/include/sys/ttydefaults.h Examining data/bsdgames-2.17/include/sys/cdefs.h Examining data/bsdgames-2.17/include/termios.h Examining data/bsdgames-2.17/include/signal.h Examining data/bsdgames-2.17/include/stdlib.h Examining data/bsdgames-2.17/include/string.h Examining data/bsdgames-2.17/include/stdio.h Examining data/bsdgames-2.17/morse/morse.c Examining data/bsdgames-2.17/sail/parties.c Examining data/bsdgames-2.17/sail/display.h Examining data/bsdgames-2.17/sail/extern.h Examining data/bsdgames-2.17/sail/lo_main.c Examining data/bsdgames-2.17/sail/dr_1.c Examining data/bsdgames-2.17/sail/dr_2.c Examining data/bsdgames-2.17/sail/dr_3.c Examining data/bsdgames-2.17/sail/dr_4.c Examining data/bsdgames-2.17/sail/dr_5.c Examining data/bsdgames-2.17/sail/pl_1.c Examining data/bsdgames-2.17/sail/pl_2.c Examining data/bsdgames-2.17/sail/pl_3.c Examining data/bsdgames-2.17/sail/pl_4.c Examining data/bsdgames-2.17/sail/pl_5.c Examining data/bsdgames-2.17/sail/pl_6.c Examining data/bsdgames-2.17/sail/driver.h Examining data/bsdgames-2.17/sail/player.h Examining data/bsdgames-2.17/sail/pl_7.c Examining data/bsdgames-2.17/sail/machdep.h Examining data/bsdgames-2.17/sail/dr_main.c Examining data/bsdgames-2.17/sail/game.c Examining data/bsdgames-2.17/sail/sync.c Examining data/bsdgames-2.17/sail/globals.c Examining data/bsdgames-2.17/sail/main.c Examining data/bsdgames-2.17/sail/version.c Examining data/bsdgames-2.17/sail/restart.h Examining data/bsdgames-2.17/sail/misc.c Examining data/bsdgames-2.17/sail/pl_main.c Examining data/bsdgames-2.17/sail/assorted.c Examining data/bsdgames-2.17/pom/pom.c Examining data/bsdgames-2.17/monop/trade.c Examining data/bsdgames-2.17/monop/execute.c Examining data/bsdgames-2.17/monop/morg.c Examining data/bsdgames-2.17/monop/houses.c Examining data/bsdgames-2.17/monop/malloc.c Examining data/bsdgames-2.17/monop/rent.c Examining data/bsdgames-2.17/monop/roll.c Examining data/bsdgames-2.17/monop/deck.h Examining data/bsdgames-2.17/monop/jail.c Examining data/bsdgames-2.17/monop/prop.c Examining data/bsdgames-2.17/monop/getinp.c Examining data/bsdgames-2.17/monop/monop.c Examining data/bsdgames-2.17/monop/initdeck.c Examining data/bsdgames-2.17/monop/cards.c Examining data/bsdgames-2.17/monop/spec.c Examining data/bsdgames-2.17/monop/print.c Examining data/bsdgames-2.17/monop/monop.h Examining data/bsdgames-2.17/monop/misc.c Examining data/bsdgames-2.17/arithmetic/arithmetic.c Examining data/bsdgames-2.17/battlestar/command1.c Examining data/bsdgames-2.17/battlestar/words.c Examining data/bsdgames-2.17/battlestar/save.c Examining data/bsdgames-2.17/battlestar/command2.c Examining data/bsdgames-2.17/battlestar/command3.c Examining data/bsdgames-2.17/battlestar/command4.c Examining data/bsdgames-2.17/battlestar/command5.c Examining data/bsdgames-2.17/battlestar/command6.c Examining data/bsdgames-2.17/battlestar/init.c Examining data/bsdgames-2.17/battlestar/battlestar.c Examining data/bsdgames-2.17/battlestar/command7.c Examining data/bsdgames-2.17/battlestar/nightfile.c Examining data/bsdgames-2.17/battlestar/extern.h Examining data/bsdgames-2.17/battlestar/parse.c Examining data/bsdgames-2.17/battlestar/dayfile.c Examining data/bsdgames-2.17/battlestar/getcom.c Examining data/bsdgames-2.17/battlestar/globals.c Examining data/bsdgames-2.17/battlestar/nightobjs.c Examining data/bsdgames-2.17/battlestar/fly.c Examining data/bsdgames-2.17/battlestar/cypher.c Examining data/bsdgames-2.17/battlestar/dayobjs.c Examining data/bsdgames-2.17/battlestar/misc.c Examining data/bsdgames-2.17/battlestar/room.c Examining data/bsdgames-2.17/hack/def.objclass.h Examining data/bsdgames-2.17/hack/def.monst.h Examining data/bsdgames-2.17/hack/hack.pri.c Examining data/bsdgames-2.17/hack/alloc.c Examining data/bsdgames-2.17/hack/hack.termcap.c Examining data/bsdgames-2.17/hack/rnd.c Examining data/bsdgames-2.17/hack/hack.wizard.c Examining data/bsdgames-2.17/hack/def.mkroom.h Examining data/bsdgames-2.17/hack/def.trap.h Examining data/bsdgames-2.17/hack/extern.h Examining data/bsdgames-2.17/hack/hack.objnam.c Examining data/bsdgames-2.17/hack/hack.bones.c Examining data/bsdgames-2.17/hack/makedefs.c Examining data/bsdgames-2.17/hack/hack.read.c Examining data/bsdgames-2.17/hack/def.edog.h Examining data/bsdgames-2.17/hack/def.rm.h Examining data/bsdgames-2.17/hack/hack.mklev.c Examining data/bsdgames-2.17/hack/hack.topl.c Examining data/bsdgames-2.17/hack/hack.unix.c Examining data/bsdgames-2.17/hack/hack.version.c Examining data/bsdgames-2.17/hack/hack.mhitu.c Examining data/bsdgames-2.17/hack/hack.mon.c Examining data/bsdgames-2.17/hack/hack.fight.c Examining data/bsdgames-2.17/hack/hack.do.c Examining data/bsdgames-2.17/hack/def.wseg.h Examining data/bsdgames-2.17/hack/hack.track.c Examining data/bsdgames-2.17/hack/hack.search.c Examining data/bsdgames-2.17/hack/hack.steal.c Examining data/bsdgames-2.17/hack/hack.ioctl.c Examining data/bsdgames-2.17/hack/date.h Examining data/bsdgames-2.17/hack/def.func_tab.h Examining data/bsdgames-2.17/hack/hack.do_wear.c Examining data/bsdgames-2.17/hack/hack.shknam.c Examining data/bsdgames-2.17/hack/hack.shk.c Examining data/bsdgames-2.17/hack/hack.worn.c Examining data/bsdgames-2.17/hack/hack.u_init.c Examining data/bsdgames-2.17/hack/hack.vault.c Examining data/bsdgames-2.17/hack/hack.mkshop.c Examining data/bsdgames-2.17/hack/hack.do_name.c Examining data/bsdgames-2.17/hack/hack.cmd.c Examining data/bsdgames-2.17/hack/hack.h Examining data/bsdgames-2.17/hack/def.obj.h Examining data/bsdgames-2.17/hack/hack.dog.c Examining data/bsdgames-2.17/hack/hack.mfndpos.h Examining data/bsdgames-2.17/hack/hack.tty.c Examining data/bsdgames-2.17/hack/hack.mkmaze.c Examining data/bsdgames-2.17/hack/hack.lev.c Examining data/bsdgames-2.17/hack/def.objects.h Examining data/bsdgames-2.17/hack/hack.engrave.c Examining data/bsdgames-2.17/hack/hack.rip.c Examining data/bsdgames-2.17/hack/hack.zap.c Examining data/bsdgames-2.17/hack/hack.save.c Examining data/bsdgames-2.17/hack/hack.monst.c Examining data/bsdgames-2.17/hack/hack.mkobj.c Examining data/bsdgames-2.17/hack/def.permonst.h Examining data/bsdgames-2.17/hack/hack.wield.c Examining data/bsdgames-2.17/hack/def.flag.h Examining data/bsdgames-2.17/hack/def.gen.h Examining data/bsdgames-2.17/hack/hack.trap.c Examining data/bsdgames-2.17/hack/hack.Decl.c Examining data/bsdgames-2.17/hack/def.gold.h Examining data/bsdgames-2.17/hack/hack.worm.c Examining data/bsdgames-2.17/hack/hack.makemon.c Examining data/bsdgames-2.17/hack/def.eshk.h Examining data/bsdgames-2.17/hack/config.h Examining data/bsdgames-2.17/hack/hack.c Examining data/bsdgames-2.17/hack/hack.apply.c Examining data/bsdgames-2.17/hack/hack.eat.c Examining data/bsdgames-2.17/hack/hack.end.c Examining data/bsdgames-2.17/hack/hack.invent.c Examining data/bsdgames-2.17/hack/hack.main.c Examining data/bsdgames-2.17/hack/hack.options.c Examining data/bsdgames-2.17/hack/hack.pager.c Examining data/bsdgames-2.17/hack/hack.potion.c Examining data/bsdgames-2.17/hack/hack.rumors.c Examining data/bsdgames-2.17/hack/hack.timeout.c Examining data/bsdgames-2.17/hack/hack.o_init.c Examining data/bsdgames-2.17/tetris/input.c Examining data/bsdgames-2.17/tetris/screen.c Examining data/bsdgames-2.17/tetris/tetris.h Examining data/bsdgames-2.17/tetris/scores.h Examining data/bsdgames-2.17/tetris/shapes.c Examining data/bsdgames-2.17/tetris/input.h Examining data/bsdgames-2.17/tetris/screen.h Examining data/bsdgames-2.17/tetris/tetris.c Examining data/bsdgames-2.17/tetris/scores.c Examining data/bsdgames-2.17/hunt/huntd/ctl_transact.c Examining data/bsdgames-2.17/hunt/huntd/get_names.c Examining data/bsdgames-2.17/hunt/huntd/answer.c Examining data/bsdgames-2.17/hunt/huntd/shots.c Examining data/bsdgames-2.17/hunt/huntd/execute.c Examining data/bsdgames-2.17/hunt/huntd/talk_ctl.h Examining data/bsdgames-2.17/hunt/huntd/extern.c Examining data/bsdgames-2.17/hunt/huntd/expl.c Examining data/bsdgames-2.17/hunt/huntd/terminal.c Examining data/bsdgames-2.17/hunt/huntd/bsd.h Examining data/bsdgames-2.17/hunt/huntd/faketalk.c Examining data/bsdgames-2.17/hunt/huntd/ctl.c Examining data/bsdgames-2.17/hunt/huntd/hunt.h Examining data/bsdgames-2.17/hunt/huntd/makemaze.c Examining data/bsdgames-2.17/hunt/huntd/driver.c Examining data/bsdgames-2.17/hunt/huntd/draw.c Examining data/bsdgames-2.17/hunt/huntd/pathname.c Examining data/bsdgames-2.17/hunt/hunt/otto.c Examining data/bsdgames-2.17/hunt/hunt/connect.c Examining data/bsdgames-2.17/hunt/hunt/playit.c Examining data/bsdgames-2.17/hunt/hunt/hunt.c Examining data/bsdgames-2.17/factor/factor.c Examining data/bsdgames-2.17/dab/gamescreen.cc Examining data/bsdgames-2.17/dab/player.cc Examining data/bsdgames-2.17/dab/player.h Examining data/bsdgames-2.17/dab/algor.cc Examining data/bsdgames-2.17/dab/algor.h Examining data/bsdgames-2.17/dab/ttyscrn.cc Examining data/bsdgames-2.17/dab/human.cc Examining data/bsdgames-2.17/dab/ttyscrn.h Examining data/bsdgames-2.17/dab/human.h Examining data/bsdgames-2.17/dab/test.cc Examining data/bsdgames-2.17/dab/random.cc Examining data/bsdgames-2.17/dab/random.h Examining data/bsdgames-2.17/dab/defs.h Examining data/bsdgames-2.17/dab/main.cc Examining data/bsdgames-2.17/dab/board.cc Examining data/bsdgames-2.17/dab/box.cc Examining data/bsdgames-2.17/dab/board.h Examining data/bsdgames-2.17/dab/box.h Examining data/bsdgames-2.17/dab/gamescreen.h Examining data/bsdgames-2.17/wump/wump.c Examining data/bsdgames-2.17/number/number.c Examining data/bsdgames-2.17/rain/rain.c Examining data/bsdgames-2.17/cribbage/cribcur.h Examining data/bsdgames-2.17/cribbage/instr.c Examining data/bsdgames-2.17/cribbage/extern.c Examining data/bsdgames-2.17/cribbage/support.c Examining data/bsdgames-2.17/cribbage/score.c Examining data/bsdgames-2.17/cribbage/deck.h Examining data/bsdgames-2.17/cribbage/cards.c Examining data/bsdgames-2.17/cribbage/crib.c Examining data/bsdgames-2.17/cribbage/cribbage.h Examining data/bsdgames-2.17/cribbage/io.c Examining data/bsdgames-2.17/primes/spsp.c Examining data/bsdgames-2.17/primes/pattern.c Examining data/bsdgames-2.17/primes/pr_tbl.c Examining data/bsdgames-2.17/primes/primes.c Examining data/bsdgames-2.17/primes/primes.h Examining data/bsdgames-2.17/dm/utmpentry.c Examining data/bsdgames-2.17/dm/utmpentry.h Examining data/bsdgames-2.17/dm/dm.c Examining data/bsdgames-2.17/ppt/ppt.c Examining data/bsdgames-2.17/trek/autover.c Examining data/bsdgames-2.17/trek/computer.c Examining data/bsdgames-2.17/trek/dumpgame.c Examining data/bsdgames-2.17/trek/abandon.c Examining data/bsdgames-2.17/trek/nova.c Examining data/bsdgames-2.17/trek/attack.c Examining data/bsdgames-2.17/trek/out.c Examining data/bsdgames-2.17/trek/shield.c Examining data/bsdgames-2.17/trek/score.c Examining data/bsdgames-2.17/trek/dcrept.c Examining data/bsdgames-2.17/trek/dock.c Examining data/bsdgames-2.17/trek/systemname.c Examining data/bsdgames-2.17/trek/getpar.c Examining data/bsdgames-2.17/trek/lrscan.c Examining data/bsdgames-2.17/trek/phaser.c Examining data/bsdgames-2.17/trek/setwarp.c Examining data/bsdgames-2.17/trek/getpar.h Examining data/bsdgames-2.17/trek/dumpme.c Examining data/bsdgames-2.17/trek/kill.c Examining data/bsdgames-2.17/trek/klmove.c Examining data/bsdgames-2.17/trek/lose.c Examining data/bsdgames-2.17/trek/check_out.c Examining data/bsdgames-2.17/trek/capture.c Examining data/bsdgames-2.17/trek/visual.c Examining data/bsdgames-2.17/trek/events.c Examining data/bsdgames-2.17/trek/initquad.c Examining data/bsdgames-2.17/trek/play.c Examining data/bsdgames-2.17/trek/move.c Examining data/bsdgames-2.17/trek/warp.c Examining data/bsdgames-2.17/trek/trek.h Examining data/bsdgames-2.17/trek/rest.c Examining data/bsdgames-2.17/trek/checkcond.c Examining data/bsdgames-2.17/trek/impulse.c Examining data/bsdgames-2.17/trek/getcodi.c Examining data/bsdgames-2.17/trek/damage.c Examining data/bsdgames-2.17/trek/ram.c Examining data/bsdgames-2.17/trek/dumpssradio.c Examining data/bsdgames-2.17/trek/damaged.c Examining data/bsdgames-2.17/trek/main.c Examining data/bsdgames-2.17/trek/cgetc.c Examining data/bsdgames-2.17/trek/compkl.c Examining data/bsdgames-2.17/trek/ranf.c Examining data/bsdgames-2.17/trek/snova.c Examining data/bsdgames-2.17/trek/help.c Examining data/bsdgames-2.17/trek/externs.c Examining data/bsdgames-2.17/trek/srscan.c Examining data/bsdgames-2.17/trek/schedule.c Examining data/bsdgames-2.17/trek/destruct.c Examining data/bsdgames-2.17/trek/torped.c Examining data/bsdgames-2.17/trek/win.c Examining data/bsdgames-2.17/trek/setup.c Examining data/bsdgames-2.17/lib/getprogname.c Examining data/bsdgames-2.17/lib/strlcpy.c Examining data/bsdgames-2.17/lib/fgetln.c Examining data/bsdgames-2.17/lib/getloadavg.c Examining data/bsdgames-2.17/robots/rnd_pos.c Examining data/bsdgames-2.17/robots/make_level.c Examining data/bsdgames-2.17/robots/query.c Examining data/bsdgames-2.17/robots/extern.c Examining data/bsdgames-2.17/robots/init_field.c Examining data/bsdgames-2.17/robots/flush_in.c Examining data/bsdgames-2.17/robots/auto.c Examining data/bsdgames-2.17/robots/score.c Examining data/bsdgames-2.17/robots/robots.h Examining data/bsdgames-2.17/robots/main.c Examining data/bsdgames-2.17/robots/move_robs.c Examining data/bsdgames-2.17/robots/play_level.c Examining data/bsdgames-2.17/robots/move.c Examining data/bsdgames-2.17/pig/pig.c Examining data/bsdgames-2.17/random/random.c Examining data/bsdgames-2.17/fortune/fortune/fortune.c Examining data/bsdgames-2.17/fortune/strfile/strfile.c Examining data/bsdgames-2.17/fortune/strfile/strfile.h Examining data/bsdgames-2.17/fortune/unstr/unstr.c Examining data/bsdgames-2.17/worm/worm.c Examining data/bsdgames-2.17/adventure/wizard.c Examining data/bsdgames-2.17/adventure/save.c Examining data/bsdgames-2.17/adventure/setup.c Examining data/bsdgames-2.17/adventure/init.c Examining data/bsdgames-2.17/adventure/extern.h Examining data/bsdgames-2.17/adventure/io.c Examining data/bsdgames-2.17/adventure/subr.c Examining data/bsdgames-2.17/adventure/vocab.c Examining data/bsdgames-2.17/adventure/hdr.h Examining data/bsdgames-2.17/adventure/main.c Examining data/bsdgames-2.17/adventure/done.c Examining data/bsdgames-2.17/adventure/crc.c Examining data/bsdgames-2.17/snake/snake/snake.c Examining data/bsdgames-2.17/snake/snscore/snscore.c Examining data/bsdgames-2.17/gomoku/makemove.c Examining data/bsdgames-2.17/gomoku/stoc.c Examining data/bsdgames-2.17/gomoku/bdinit.c Examining data/bsdgames-2.17/gomoku/pickmove.c Examining data/bsdgames-2.17/gomoku/bdisp.c Examining data/bsdgames-2.17/gomoku/gomoku.h Examining data/bsdgames-2.17/gomoku/main.c Examining data/bsdgames-2.17/mille/mille.c Examining data/bsdgames-2.17/mille/save.c Examining data/bsdgames-2.17/mille/comp.c Examining data/bsdgames-2.17/mille/varpush.c Examining data/bsdgames-2.17/mille/init.c Examining data/bsdgames-2.17/mille/types.c Examining data/bsdgames-2.17/mille/extern.c Examining data/bsdgames-2.17/mille/move.c Examining data/bsdgames-2.17/mille/end.c Examining data/bsdgames-2.17/mille/mille.h Examining data/bsdgames-2.17/mille/roll.c Examining data/bsdgames-2.17/mille/table.c Examining data/bsdgames-2.17/mille/print.c Examining data/bsdgames-2.17/mille/misc.c Examining data/bsdgames-2.17/canfield/canfield/canfield.c Examining data/bsdgames-2.17/canfield/cfscores/cfscores.c Examining data/bsdgames-2.17/atc/tunable.h Examining data/bsdgames-2.17/atc/input.c Examining data/bsdgames-2.17/atc/graphics.c Examining data/bsdgames-2.17/atc/def.h Examining data/bsdgames-2.17/atc/extern.c Examining data/bsdgames-2.17/atc/extern.h Examining data/bsdgames-2.17/atc/list.c Examining data/bsdgames-2.17/atc/log.c Examining data/bsdgames-2.17/atc/main.c Examining data/bsdgames-2.17/atc/include.h Examining data/bsdgames-2.17/atc/struct.h Examining data/bsdgames-2.17/atc/tunable.c Examining data/bsdgames-2.17/atc/update.c Examining data/bsdgames-2.17/worms/worms.c Examining data/bsdgames-2.17/phantasia/io.c Examining data/bsdgames-2.17/phantasia/interplayer.c Examining data/bsdgames-2.17/phantasia/phantglobs.c Examining data/bsdgames-2.17/phantasia/setup.c Examining data/bsdgames-2.17/phantasia/fight.c Examining data/bsdgames-2.17/phantasia/gamesupport.c Examining data/bsdgames-2.17/phantasia/phantglobs.h Examining data/bsdgames-2.17/phantasia/phantdefs.h Examining data/bsdgames-2.17/phantasia/map.c Examining data/bsdgames-2.17/phantasia/main.c Examining data/bsdgames-2.17/phantasia/phantstruct.h Examining data/bsdgames-2.17/phantasia/include.h Examining data/bsdgames-2.17/phantasia/macros.h Examining data/bsdgames-2.17/phantasia/misc.c Examining data/bsdgames-2.17/hangman/hangman.h Examining data/bsdgames-2.17/hangman/playgame.c Examining data/bsdgames-2.17/hangman/endgame.c Examining data/bsdgames-2.17/hangman/setup.c Examining data/bsdgames-2.17/hangman/main.c Examining data/bsdgames-2.17/hangman/extern.c Examining data/bsdgames-2.17/hangman/getguess.c Examining data/bsdgames-2.17/hangman/prdata.c Examining data/bsdgames-2.17/hangman/prman.c Examining data/bsdgames-2.17/hangman/prword.c Examining data/bsdgames-2.17/hangman/getword.c FINAL RESULTS: data/bsdgames-2.17/fortune/fortune/fortune.c:266:10: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. (void) chmod(Fortfile->path, 0666); data/bsdgames-2.17/mille/varpush.c:93:4: [5] (buffer) gets: Does not check for buffer overflows (CWE-120, CWE-20). Use fgets() instead. gets(buf); data/bsdgames-2.17/adventure/extern.h:118:28: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). #define copystr(src, dest) strcpy((dest), (src)) data/bsdgames-2.17/adventure/setup.c:83:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, USAGE); data/bsdgames-2.17/adventure/wizard.c:80:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(magic, DECR('d', 'w', 'a', 'r', 'f')); data/bsdgames-2.17/atc/input.c:211:8: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. (void)sprintf(T_STR, st[T_STATE].rule[ruleno].str, tval); data/bsdgames-2.17/atc/input.c:325:6: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(shell, base, (char *) 0); data/bsdgames-2.17/atc/input.c:328:6: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(_PATH_BSHELL, "sh", (char *) 0); data/bsdgames-2.17/atc/log.c:164:10: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. good = fscanf(score_fp, SCORE_SCANF_FMT, data/bsdgames-2.17/atc/log.c:181:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(thisscore.name, pw->pw_name); data/bsdgames-2.17/atc/log.c:191:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(thisscore.game, cp); data/bsdgames-2.17/atc/main.c:125:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, _PATH_GAMES); data/bsdgames-2.17/atc/main.c:238:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(games, _PATH_GAMES); data/bsdgames-2.17/atc/main.c:239:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(games, GAMES); data/bsdgames-2.17/atc/main.c:251:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file, _PATH_GAMES); data/bsdgames-2.17/atc/main.c:252:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(file, line); data/bsdgames-2.17/atc/main.c:265:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(games, _PATH_GAMES); data/bsdgames-2.17/atc/main.c:266:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(games, GAMES); data/bsdgames-2.17/atc/main.c:275:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(file, _PATH_GAMES); data/bsdgames-2.17/atc/main.c:276:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(file, line); data/bsdgames-2.17/atc/main.c:299:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(games, _PATH_GAMES); data/bsdgames-2.17/atc/main.c:300:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(games, GAMES); data/bsdgames-2.17/backgammon/backgammon/main.c:155:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(TEACH, "teachgammon", args[1]?args:0, data/bsdgames-2.17/backgammon/common_source/board.c:64:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ln, bl); data/bsdgames-2.17/backgammon/common_source/board.c:74:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ln, sv); data/bsdgames-2.17/backgammon/common_source/board.c:104:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ln, bl); data/bsdgames-2.17/backgammon/common_source/board.c:109:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ln, sv); data/bsdgames-2.17/backgammon/common_source/board.c:140:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ln, bl); data/bsdgames-2.17/backgammon/teachgammon/teach.c:155:2: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(EXEC, "backgammon", "-n", args[1]?args:0, (char *) 0); data/bsdgames-2.17/banner/banner.c:1069:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(message, *argv); data/bsdgames-2.17/banner/banner.c:1072:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(message, *argv); data/bsdgames-2.17/battlestar/command4.c:217:58: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. deposit = location[position].up * (location[position].access || position == FINAL); data/bsdgames-2.17/battlestar/cypher.c:72:27: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (location[position].access || wiz || tempwiz) { data/bsdgames-2.17/battlestar/cypher.c:73:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!location[position].access) data/bsdgames-2.17/battlestar/extern.h:248:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. #define access link[5] data/bsdgames-2.17/battlestar/parse.c:126:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(words[i - 1], words[i]); data/bsdgames-2.17/battlestar/parse.c:146:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(words[i - 1], words[i]); data/bsdgames-2.17/battlestar/parse.c:167:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmpword, words[n - 1]); data/bsdgames-2.17/battlestar/parse.c:168:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(words[n - 1], words[n + 1]); data/bsdgames-2.17/battlestar/parse.c:169:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(words[n + 1], tmpword); data/bsdgames-2.17/battlestar/parse.c:180:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(words[i - 1], words[i + 1]); data/bsdgames-2.17/boggle/boggle/bog.c:398:12: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(pwordsp, buf); data/bsdgames-2.17/cribbage/crib.c:153:7: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. getlogin(), cgames, pgames); data/bsdgames-2.17/cribbage/instr.c:88:3: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl("/bin/sh", "sh", "-c", path, (char *) NULL); data/bsdgames-2.17/cribbage/io.c:391:8: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. (void)vsprintf(&Msgbuf[Newpos], fmt, ap); data/bsdgames-2.17/cribbage/io.c:407:8: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. (void)vsprintf(&Msgbuf[Newpos], fmt, ap); data/bsdgames-2.17/cribbage/score.c:161:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(explan, buf); data/bsdgames-2.17/cribbage/score.c:171:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(explan, buf); data/bsdgames-2.17/cribbage/support.c:136:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(prompt, "Your %s scores ", s); data/bsdgames-2.17/dab/board.cc:256:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, s, ap); data/bsdgames-2.17/dm/dm.c:118:2: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv(pbuf, args); data/bsdgames-2.17/factor/factor.c:270:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fp, buf); data/bsdgames-2.17/fish/fish.c:475:9: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. (void)execl("/bin/sh", "sh", "-c", pager, (char *) NULL); data/bsdgames-2.17/fortune/fortune/fortune.c:79:39: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define DPRINTF(l,x) if (Debug >= l) fprintf x; else data/bsdgames-2.17/fortune/fortune/fortune.c:526:10: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). (void) strcat(strcat(strcpy(tpath, dir), "/"), file); data/bsdgames-2.17/fortune/fortune/fortune.c:526:24: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcat(strcat(strcpy(tpath, dir), "/"), file); data/bsdgames-2.17/fortune/fortune/fortune.c:623:22: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. fp->was_pos_file = (access(fp->posfile, W_OK) >= 0); data/bsdgames-2.17/fortune/fortune/fortune.c:731:27: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. obscene->was_pos_file = (access(obscene->posfile, W_OK) >= 0); data/bsdgames-2.17/fortune/fortune/fortune.c:847:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(datfile, R_OK) < 0) { data/bsdgames-2.17/fortune/strfile/strfile.c:329:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(Outfile, *argv); data/bsdgames-2.17/fortune/strfile/strfile.c:336:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(Outfile, Infile); data/bsdgames-2.17/fortune/strfile/strfile.c:363:2: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, fmt, file); data/bsdgames-2.17/fortune/unstr/unstr.c:125:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(Datafile, Infile); data/bsdgames-2.17/gomoku/main.c:181:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fmtbuf, data/bsdgames-2.17/gomoku/main.c:283:4: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(fmtbuf, fmt[color], movenum, stoc(curmove)); data/bsdgames-2.17/gomoku/main.c:393:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fmtbuf, "suggest %c %s", i == BLACK ? 'B' : 'W', data/bsdgames-2.17/gomoku/main.c:441:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str, "overlap %s%c,", stoc(s1), pdir[d1]); data/bsdgames-2.17/gomoku/main.c:443:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str, "%s%c = %x", stoc(s2), pdir[d2], overlap[n]); data/bsdgames-2.17/gomoku/main.c:448:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fmtbuf, "V %s %x/%d %d %x/%d %d %d %x", stoc(i), data/bsdgames-2.17/gomoku/main.c:454:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fmtbuf, "FB %s %x %x %x %x", stoc(i), data/bsdgames-2.17/gomoku/main.c:458:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fmtbuf, "FW %s %x %x %x %x", stoc(i), data/bsdgames-2.17/gomoku/pickmove.c:104:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fmtbuf, "- %s %x/%d %d %x/%d %d %d", stoc(sp - board), data/bsdgames-2.17/gomoku/pickmove.c:121:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fmtbuf, "B %s %x/%d %d %x/%d %d %d", data/bsdgames-2.17/gomoku/pickmove.c:128:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fmtbuf, "W %s %x/%d %d %x/%d %d %d", data/bsdgames-2.17/gomoku/pickmove.c:682:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fmtbuf, "loop: %c %s", "BW"[curcolor], data/bsdgames-2.17/gomoku/pickmove.c:935:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fmtbuf, "e %s o%d i%d c%d m%x %x", data/bsdgames-2.17/gomoku/pickmove.c:1237:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fmtbuf, "sortc: %s%c l%d", stoc(fcbp->c_vertex), data/bsdgames-2.17/gomoku/pickmove.c:1242:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str, " %s%c", stoc((*cpp)->c_vertex), data/bsdgames-2.17/gomoku/pickmove.c:1300:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str, " %s%c", stoc((*cpp)->c_vertex), data/bsdgames-2.17/gomoku/pickmove.c:1310:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str, " %s%c", stoc((*cpp)->c_vertex), data/bsdgames-2.17/gomoku/pickmove.c:1347:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str, " %s%c%x", stoc(tcbp->c_vertex), pdir[tcbp->c_dir], data/bsdgames-2.17/gomoku/pickmove.c:1351:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str, " %s%c", stoc(cbp->c_vertex), pdir[cbp->c_dir]); data/bsdgames-2.17/hack/hack.bones.c:117:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy((char *) mtmp->mextra, plname); data/bsdgames-2.17/hack/hack.do_name.c:158:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(NAME(mtmp2), buf); data/bsdgames-2.17/hack/hack.do_name.c:188:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(ONAME(otmp2), buf); data/bsdgames-2.17/hack/hack.do_name.c:255:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(str, buf); data/bsdgames-2.17/hack/hack.do_name.c:276:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(buf, NAME(mtmp)); data/bsdgames-2.17/hack/hack.do_name.c:287:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char *) mtmp->mextra, !rn2(5) ? plname : gn); data/bsdgames-2.17/hack/hack.do_name.c:289:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, "%s's ghost", gn); data/bsdgames-2.17/hack/hack.do_name.c:294:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(buf, shkname(mtmp)); data/bsdgames-2.17/hack/hack.do_name.c:299:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, "the %s%s", data/bsdgames-2.17/hack/hack.do_name.c:305:10: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). (void) strcat(buf, NAME(mtmp)); data/bsdgames-2.17/hack/hack.do_name.c:344:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, "the %s %s", adj, bp); data/bsdgames-2.17/hack/hack.dog.c:521:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(NAME(mtmp2), NAME(mtmp)); data/bsdgames-2.17/hack/hack.eat.c:333:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(msgbuf, "You finished eating the %s.", data/bsdgames-2.17/hack/hack.end.c:74:24: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define Sprintf (void) sprintf data/bsdgames-2.17/hack/hack.end.c:363:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(t0->date, getdate()); data/bsdgames-2.17/hack/hack.end.c:556:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(bp, hpbuf); data/bsdgames-2.17/hack/hack.engrave.c:199:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(ep->engr_txt, s); data/bsdgames-2.17/hack/hack.engrave.c:331:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(sp, oep->engr_txt); data/bsdgames-2.17/hack/hack.engrave.c:332:10: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). (void) strcat(sp, buf); data/bsdgames-2.17/hack/hack.engrave.c:335:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(sp, buf); data/bsdgames-2.17/hack/hack.fight.c:104:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, "%s %s", Monnam(magr), data/bsdgames-2.17/hack/hack.invent.c:449:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(lets, bp);/* necessary since we destroy buf */ data/bsdgames-2.17/hack/hack.invent.c:730:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(li, "%c - %s.", data/bsdgames-2.17/hack/hack.invent.c:894:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(gbuf, "%ld gold piece%s", data/bsdgames-2.17/hack/hack.main.c:162:24: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. if (!*plname && (s = getlogin())) data/bsdgames-2.17/hack/hack.main.c:279:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(lock, plname); data/bsdgames-2.17/hack/hack.main.c:284:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(lock, plname); data/bsdgames-2.17/hack/hack.main.c:305:12: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(genocided, sfoo); data/bsdgames-2.17/hack/hack.main.c:306:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(fut_geno, genocided); data/bsdgames-2.17/hack/hack.main.c:311:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(SAVEF, "save/%d%s", getuid(), plname); data/bsdgames-2.17/hack/hack.objnam.c:72:24: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. #define Sprintf (void) sprintf data/bsdgames-2.17/hack/hack.objnam.c:73:24: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). #define Strcat (void) strcat data/bsdgames-2.17/hack/hack.objnam.c:74:23: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). #define Strcpy (void) strcpy data/bsdgames-2.17/hack/hack.options.c:248:10: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). (void) strcat(buf, flags.female ? "female," : "male,"); data/bsdgames-2.17/hack/hack.pager.c:291:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(tl->line_text, text); data/bsdgames-2.17/hack/hack.pager.c:393:5: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(catmore, "page", (char *) 0); data/bsdgames-2.17/hack/hack.pager.c:429:4: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(str, str, (char *) 0); data/bsdgames-2.17/hack/hack.pager.c:431:4: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl("/bin/sh", "sh", (char *) 0); data/bsdgames-2.17/hack/hack.pri.c:110:2: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, ap); data/bsdgames-2.17/hack/hack.pri.c:758:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). (void) strcat(newbot, hu_stat[u.uhs]); data/bsdgames-2.17/hack/hack.pri.c:780:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(oldbot, newbot); data/bsdgames-2.17/hack/hack.rip.c:94:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(buf, plname); data/bsdgames-2.17/hack/hack.rip.c:99:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, "killed by%s", data/bsdgames-2.17/hack/hack.rip.c:104:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(buf, killer); data/bsdgames-2.17/hack/hack.rip.c:133:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(ripmid, 8 + n, text, 8 - n, ""); data/bsdgames-2.17/hack/hack.shk.c:841:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, "x - %s", doname(obj)); data/bsdgames-2.17/hack/hack.topl.c:90:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(toplines, last_redone_topl->topl_text); data/bsdgames-2.17/hack/hack.topl.c:127:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(tl->topl_text, toplines); data/bsdgames-2.17/hack/hack.topl.c:224:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(pbuf, line); data/bsdgames-2.17/hack/hack.topl.c:226:10: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. (void) vsprintf(pbuf, line, ap); data/bsdgames-2.17/hack/hack.topl.c:239:10: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). (void) strcat(toplines, bp); data/bsdgames-2.17/hack/hack.tty.c:209:2: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, ap); data/bsdgames-2.17/hack/hack.u_init.c:75:23: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). #define Strcpy (void) strcpy data/bsdgames-2.17/hack/hack.u_init.c:76:23: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). #define Strcat (void) strcat data/bsdgames-2.17/hack/hack.unix.c:196:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(filename, name); data/bsdgames-2.17/hack/hack.unix.c:200:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(filename + (np - path) + 1, name); data/bsdgames-2.17/hack/hack.unix.c:510:3: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(mr, mr, (char *) 0); data/bsdgames-2.17/hunt/hunt/connect.c:58:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(Buf, ttyname(fileno(stderr))); data/bsdgames-2.17/hunt/hunt/hunt.c:344:10: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(Daemon.sun_path, Sock_name); data/bsdgames-2.17/hunt/hunt/hunt.c:723:4: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(Driver, "HUNT", (char *) NULL); data/bsdgames-2.17/hunt/hunt/hunt.c:726:4: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(Driver, "HUNT", "-p", use_port, (char *) NULL); data/bsdgames-2.17/hunt/huntd/answer.c:129:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, "%s: ", name); data/bsdgames-2.17/hunt/huntd/answer.c:131:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, "%s[%c]: ", name, team); data/bsdgames-2.17/hunt/huntd/driver.c:307:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(Daemon.sun_path, Stat_name); data/bsdgames-2.17/hunt/huntd/driver.c:347:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void) strcpy(Daemon.sun_path, Sock_name); data/bsdgames-2.17/hunt/huntd/driver.c:553:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(ouch->p_death, "| %s by %s |", cp, data/bsdgames-2.17/hunt/huntd/driver.c:559:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(ouch->p_death, "| %s by %s |", cp, credit->i_name); data/bsdgames-2.17/hunt/huntd/driver.c:683:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(Buf, "%s detonated.", data/bsdgames-2.17/hunt/huntd/faketalk.c:168:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, "HELO HuntGame@%s\r\n", my_machine_name); data/bsdgames-2.17/hunt/huntd/faketalk.c:171:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void) sprintf(buf, "EXPN %s@%s\r\n", RENDEZVOUS, my_machine_name); data/bsdgames-2.17/mille/save.c:73:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, Fromfile); data/bsdgames-2.17/mille/save.c:127:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, ctime(tp)); data/bsdgames-2.17/mille/save.c:163:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, ctime(&sbuf.st_mtime)); data/bsdgames-2.17/mille/save.c:170:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(Initstr, "%s [%s]\n", file, buf); data/bsdgames-2.17/monop/execute.c:205:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, ctime(&t)); data/bsdgames-2.17/monop/execute.c:266:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, ctime(&sbuf.st_mtime)); data/bsdgames-2.17/monop/houses.c:136:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(cur_prop, "%s (%d): ", data/bsdgames-2.17/monop/houses.c:239:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(cur_prop,"%s (%d): ", data/bsdgames-2.17/monop/houses.c:242:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(cur_prop,"%s (H): ",mp->sq[i]->name); data/bsdgames-2.17/monop/monop.c:133:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(play[i].name, buf); data/bsdgames-2.17/monop/prop.c:181:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(buf, "%s: ", name_list[i]); data/bsdgames-2.17/phantasia/fight.c:882:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Curmonster.m_name, Othermonster.m_name); data/bsdgames-2.17/phantasia/gamesupport.c:189:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(playerp->p_name, Databuf); data/bsdgames-2.17/phantasia/gamesupport.c:542:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sbuf.sb_login, Player.p_login); data/bsdgames-2.17/phantasia/gamesupport.c:543:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sbuf.sb_name, Player.p_name); data/bsdgames-2.17/phantasia/gamesupport.c:545:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sbuf.sb_type, descrtype(&Player, TRUE)); data/bsdgames-2.17/phantasia/main.c:167:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Player.p_login, Login); data/bsdgames-2.17/phantasia/main.c:289:15: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. if ((Login = getlogin()) == NULL) data/bsdgames-2.17/phantasia/main.c:653:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Databuf, "The present ruler is %s Level:%.0f", data/bsdgames-2.17/phantasia/main.c:668:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Databuf, "The Valar is %s Login: %s", Other.p_name, Other.p_login); data/bsdgames-2.17/phantasia/main.c:684:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Databuf, "%s Login: %s", Other.p_name, Other.p_login); data/bsdgames-2.17/phantasia/main.c:701:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nxtname, hiname); data/bsdgames-2.17/phantasia/main.c:702:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(hiname, Other.p_name); data/bsdgames-2.17/phantasia/main.c:711:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(nxtname, Other.p_name); data/bsdgames-2.17/phantasia/main.c:714:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Databuf, "%s Level:%.0f and %s Level:%.0f", data/bsdgames-2.17/phantasia/misc.c:140:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Databuf, " is in %s (%.0f,%.0f)", label, playerp->p_x, playerp->p_y); data/bsdgames-2.17/phantasia/misc.c:504:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Databuf, results[type]); data/bsdgames-2.17/phantasia/misc.c:645:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Curmonster.m_name, Player.p_name); data/bsdgames-2.17/phantasia/misc.c:675:3: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl(_PATH_GAMEPROG, "phantasia", "-s", data/bsdgames-2.17/phantasia/misc.c:948:11: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. funcp = printf; data/bsdgames-2.17/phantasia/setup.c:146:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Curmonster.m_name, Databuf); data/bsdgames-2.17/phantasia/setup.c:227:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, str, file); data/bsdgames-2.17/primes/primes.c:252:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(hflag ? "%" PRIx64 : "%" PRIu64, factor); data/bsdgames-2.17/primes/primes.c:324:5: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(hflag ? "%" PRIx64 : "%" PRIu64, start); data/bsdgames-2.17/quiz/quiz.c:176:12: [4] (shell) popen: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if ((pf = popen(pager, "w")) == NULL) data/bsdgames-2.17/quiz/quiz.c:271:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void)strcpy(question, t); data/bsdgames-2.17/robots/auto.c:235:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). (void)strcpy(ok_moves, find_moves()); data/bsdgames-2.17/sail/dr_1.c:193:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(message, "killed in melee: %d. %s: %d", data/bsdgames-2.17/sail/dr_1.c:225:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(message, "captured by the %s!", to->shipname); data/bsdgames-2.17/sail/dr_1.c:227:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(message, "killed in melee: %d. %s: %d", data/bsdgames-2.17/sail/dr_2.c:239:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(temp, st); data/bsdgames-2.17/sail/dr_2.c:243:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command, temp); data/bsdgames-2.17/sail/dr_2.c:254:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command, temp); data/bsdgames-2.17/sail/dr_2.c:264:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(command, temp); data/bsdgames-2.17/sail/lo_main.c:86:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(sbuf, "%10.10s (%s)", log.l_name, pass->pw_name); data/bsdgames-2.17/sail/misc.c:231:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(log[NLOG-1].l_name, s->file->captain); data/bsdgames-2.17/sail/pl_5.c:148:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(movebuf, buf); data/bsdgames-2.17/sail/sync.c:103:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(message, format, ap); data/bsdgames-2.17/sail/sync.c:116:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf(message, fmt, ap); data/bsdgames-2.17/sail/sync.c:128:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, SF, game); data/bsdgames-2.17/sail/sync.c:137:3: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, LF, game); data/bsdgames-2.17/sail/sync.c:153:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(sync_lock, LF, game); data/bsdgames-2.17/sail/sync.c:154:2: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(sync_file, SF, game); data/bsdgames-2.17/sail/sync.c:198:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(sync_bp, "%d %d 1 %s\n", type, ship->file->index, a); data/bsdgames-2.17/snake/snake/snake.c:1003:7: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. getlogin(), cashvalue, lcnt, ccnt, msg, ctime(&t)); data/bsdgames-2.17/tetris/scores.c:188:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sp->hs_name, me); data/bsdgames-2.17/tetris/scores.c:225:6: [4] (misc) getlogin: It's often easy to fool getlogin. Sometimes it does not work at all, because some program messed up the utmp file. Often, it gives only the first 8 characters of the login name. The user currently logged in on the controlling tty of our program need not be the user who started it. Avoid getlogin() for security-related purposes (CWE-807). Use getpwuid(geteuid()) and extract the desired information instead. p = getlogin(); data/bsdgames-2.17/tetris/tetris.c:196:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(key_msg, data/bsdgames-2.17/trek/getpar.c:156:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(input, r->abrev); data/bsdgames-2.17/trek/getpar.c:157:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(input, r->full); data/bsdgames-2.17/trek/getpar.c:215:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(format, "%%%d[^%s]", l, t); data/bsdgames-2.17/trek/getpar.c:223:7: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. i = scanf(format, r); data/bsdgames-2.17/trek/shield.c:123:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(s, "%s %s up. Do you want %s down", device, dev2, dev3); data/bsdgames-2.17/trek/shield.c:125:10: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. (void)sprintf(s, "%s %s down. Do you want %s up", device, dev2, dev3); data/bsdgames-2.17/wump/wump.c:760:6: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(_PATH_WUMPINFO, R_OK)) { data/bsdgames-2.17/wump/wump.c:779:9: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. (void)execl("/bin/sh", "sh", "-c", pager, (char *) NULL); data/bsdgames-2.17/adventure/init.c:291:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand((int) (time((time_t *) NULL))); /* random seed */ data/bsdgames-2.17/adventure/init.c:293:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(371); /* non-random seed */ data/bsdgames-2.17/adventure/io.c:172:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ch = (*inptr ^ random()) & 0xFF; /* Decrypt input data */ data/bsdgames-2.17/adventure/io.c:191:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(SEED); /* which is lightly encrypted. */ data/bsdgames-2.17/adventure/save.c:138:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom((int) sum); data/bsdgames-2.17/adventure/save.c:149:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *s = (*s ^ random()) & 0xFF; /* Lightly encrypt */ data/bsdgames-2.17/adventure/save.c:176:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom((int) sum); data/bsdgames-2.17/adventure/save.c:180:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. *s = (*s ^ random()) & 0xFF; /* Lightly decrypt */ data/bsdgames-2.17/adventure/setup.c:97:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(SEED); data/bsdgames-2.17/adventure/setup.c:103:44: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. printf("0x%02x,", (unsigned int)('\t' ^ random()) & 0xFF); data/bsdgames-2.17/adventure/setup.c:119:40: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. printf("0x%02x,", (unsigned int)(c ^ random()) & 0xFF); data/bsdgames-2.17/arithmetic/arithmetic.c:122:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "r:o:")) != -1) data/bsdgames-2.17/arithmetic/arithmetic.c:145:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom((int)time((time_t *)NULL)); data/bsdgames-2.17/arithmetic/arithmetic.c:204:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. op = keys[random() % nkeys]; data/bsdgames-2.17/arithmetic/arithmetic.c:225:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. left = right * result + random() % right; data/bsdgames-2.17/arithmetic/arithmetic.c:337:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. value = random() % (maxval + penalty[op][operand]); data/bsdgames-2.17/atc/input.c:318:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((shell = getenv("SHELL")) != NULL) data/bsdgames-2.17/atc/main.c:84:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(ac, av, "ulstpg:f:r:")) != -1) { data/bsdgames-2.17/atc/main.c:112:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(seed); data/bsdgames-2.17/atc/update.c:312:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. p.plane_type = random() % 2; data/bsdgames-2.17/atc/update.c:315:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random() % num_starts; data/bsdgames-2.17/atc/update.c:328:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. while ((rnd2 = random() % num_starts) == rnd) data/bsdgames-2.17/backgammon/backgammon/main.c:117:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. tflag = getcaps(getenv("TERM")); data/bsdgames-2.17/backgammon/backgammon/main.c:122:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(t); /* 'random' seed */ data/bsdgames-2.17/backgammon/common_source/back.h:46:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define rnum(r) (random()%r) data/bsdgames-2.17/backgammon/teachgammon/teach.c:80:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. tflag = getcaps(getenv("TERM")); data/bsdgames-2.17/banner/banner.c:1041:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "w:td")) != -1) data/bsdgames-2.17/battlestar/command6.c:110:26: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (score_fp == NULL && getenv("BATTLESTAR_QUIET") == NULL) data/bsdgames-2.17/battlestar/init.c:58:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(getpid()); data/bsdgames-2.17/battlestar/save.c:176:10: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. home = getenv("HOME"); data/bsdgames-2.17/boggle/boggle/bog.c:142:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "bds:t:w:")) != -1) data/bsdgames-2.17/boggle/boggle/bog.c:652:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. p = (int) (random() % 16); data/bsdgames-2.17/boggle/boggle/bog.c:653:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. q = (int) (random() % 16); data/bsdgames-2.17/boggle/boggle/bog.c:664:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. board[i] = cubes[i][random() % 6]; data/bsdgames-2.17/boggle/boggle/mach.c:99:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(seed); data/bsdgames-2.17/canfield/canfield/canfield.c:554:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. j = random() % decksize; data/bsdgames-2.17/canfield/canfield/canfield.c:1676:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(getpid()); data/bsdgames-2.17/cribbage/cards.c:61:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(i); data/bsdgames-2.17/cribbage/crib.c:92:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "eqr")) != -1) data/bsdgames-2.17/cribbage/instr.c:77:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!(path = getenv("PAGER")) || (*path == 0)) data/bsdgames-2.17/dab/main.cc:113:17: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt(argc, argv, "awp:n:")) != -1) data/bsdgames-2.17/dab/random.cc:78:15: [3] (random) lrand48: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t r = ::lrand48(); data/bsdgames-2.17/factor/factor.c:151:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "")) != -1) data/bsdgames-2.17/fish/fish.c:108:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "p")) != -1) data/bsdgames-2.17/fish/fish.c:118:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(time((time_t *)NULL)); data/bsdgames-2.17/fish/fish.c:445:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return((int)random() % n); data/bsdgames-2.17/fish/fish.c:468:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!(pager = getenv("PAGER")) || (*pager == 0)) data/bsdgames-2.17/fortune/fortune/fortune.c:242:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(((unsigned long)tv.tv_sec) * data/bsdgames-2.17/fortune/fortune/fortune.c:354:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "aDefilm:osw")) != -1) data/bsdgames-2.17/fortune/fortune/fortune.c:356:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "aefilm:osw")) != -1) data/bsdgames-2.17/fortune/fortune/fortune.c:988:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. choice = random() % 100; data/bsdgames-2.17/fortune/fortune/fortune.c:1008:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. choice = random() % Noprob_tbl.str_numstr; data/bsdgames-2.17/fortune/fortune/fortune.c:1050:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. choice = random() % parent->num_children; data/bsdgames-2.17/fortune/fortune/fortune.c:1060:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. choice = random() % parent->tbl.str_numstr; data/bsdgames-2.17/fortune/fortune/fortune.c:1145:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. fp->pos = random() % fp->tbl.str_numstr; data/bsdgames-2.17/fortune/fortune/fortune.c:1151:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. fp->pos = random() % fp->tbl.str_numstr; data/bsdgames-2.17/fortune/strfile/strfile.c:296:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "c:iorsx")) != -1) data/bsdgames-2.17/fortune/strfile/strfile.c:475:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom((int)(time((time_t *) NULL) + getpid())); data/bsdgames-2.17/fortune/strfile/strfile.c:485:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. i = random() % cnt; data/bsdgames-2.17/gomoku/main.c:108:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "bcdD:u")) != -1) { data/bsdgames-2.17/gomoku/main.c:137:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(0)); data/bsdgames-2.17/gomoku/main.c:139:3: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(time(0)); data/bsdgames-2.17/gomoku/pickmove.c:217:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return (random() & 1); data/bsdgames-2.17/hack/hack.main.c:126:8: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. dir = getenv("HACKDIR"); data/bsdgames-2.17/hack/hack.main.c:158:24: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!*plname && (s = getenv("USER"))) data/bsdgames-2.17/hack/hack.main.c:160:24: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!*plname && (s = getenv("LOGNAME"))) data/bsdgames-2.17/hack/hack.main.c:250:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (((catmore = getenv("HACKPAGER")) == NULL && data/bsdgames-2.17/hack/hack.main.c:251:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. (catmore = getenv("PAGER")) == NULL) || data/bsdgames-2.17/hack/hack.main.c:285:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((sfoo = getenv("MAGIC")) != NULL) data/bsdgames-2.17/hack/hack.main.c:289:13: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. (void) srandom(*sfoo++); data/bsdgames-2.17/hack/hack.main.c:293:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((sfoo = getenv("GENOCIDED")) != NULL) { data/bsdgames-2.17/hack/hack.mklev.c:74:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define somex() ((random()%(croom->hx-croom->lx+1))+croom->lx) data/bsdgames-2.17/hack/hack.mklev.c:75:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define somey() ((random()%(croom->hy-croom->ly+1))+croom->ly) data/bsdgames-2.17/hack/hack.mklev.c:195:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (wizard && getenv("SHOPTYPE")) data/bsdgames-2.17/hack/hack.mkshop.c:89:24: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *ep = getenv("SHOPTYPE"); data/bsdgames-2.17/hack/hack.mkshop.c:128:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. (wizard && getenv("SHOPTYPE") && sroom->doorct != 0) || data/bsdgames-2.17/hack/hack.options.c:87:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((opts = getenv("HACKOPTIONS")) != NULL) data/bsdgames-2.17/hack/hack.pager.c:428:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((str = getenv("SHELL")) != NULL) data/bsdgames-2.17/hack/hack.pager.c:470:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. (void) chdir(getenv("HOME")); data/bsdgames-2.17/hack/hack.termcap.c:97:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!(term = getenv("TERM"))) data/bsdgames-2.17/hack/hack.u_init.c:395:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *ep = getenv("INVENT"); data/bsdgames-2.17/hack/hack.unix.c:102:9: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. (void) srandom((int) time((time_t *) 0)); data/bsdgames-2.17/hack/hack.unix.c:189:43: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (strchr(name, '/') != NULL || (path = getenv("PATH")) == NULL) data/bsdgames-2.17/hack/hack.unix.c:379:18: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!(mailbox = getenv("MAIL"))) data/bsdgames-2.17/hack/hack.unix.c:507:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!(mr = getenv("MAILREADER"))) data/bsdgames-2.17/hack/rnd.c:73:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define RND(x) ((random()>>3) % x) data/bsdgames-2.17/hangman/main.c:62:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "d:m:")) != -1) { data/bsdgames-2.17/hangman/setup.c:70:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL) + getpid()); data/bsdgames-2.17/hunt/hunt/hunt.c:144:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt(ac, av, "Sbcfh:l:mn:op:qst:w:")) != -1) { data/bsdgames-2.17/hunt/hunt/hunt.c:266:28: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!isatty(0) || (term = getenv("TERM")) == NULL) data/bsdgames-2.17/hunt/hunt/hunt.c:1007:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((envp = getenv("HUNT")) != NULL) { data/bsdgames-2.17/hunt/hunt/otto.c:70:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. # define random rand data/bsdgames-2.17/hunt/hunt/otto.c:590:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. && num_turns > 4 + (random() % data/bsdgames-2.17/hunt/hunt/otto.c:602:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. duck(random() % NUMDIRECTIONS); data/bsdgames-2.17/hunt/hunt/otto.c:612:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() % 5 == 0) data/bsdgames-2.17/hunt/huntd/driver.c:109:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt(ac, av, "sp:")) != -1) { data/bsdgames-2.17/mille/mille.c:95:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(getpid()); data/bsdgames-2.17/mille/mille.c:97:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(0); data/bsdgames-2.17/mille/mille.h:165:10: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. # define srandom(x) srand(x) data/bsdgames-2.17/mille/mille.h:165:21: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. # define srandom(x) srand(x) data/bsdgames-2.17/mille/mille.h:166:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. # define random() rand() data/bsdgames-2.17/mille/roll.c:59:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. tot += random() % nsides + 1; data/bsdgames-2.17/monop/monop.c:70:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(getpid()); data/bsdgames-2.17/morse/morse.c:132:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "ds")) != -1) data/bsdgames-2.17/number/number.c:100:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "l")) != -1) data/bsdgames-2.17/phantasia/main.c:321:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom((unsigned) time(NULL)); /* prime random numbers */ data/bsdgames-2.17/phantasia/misc.c:1020:21: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return ((double) (random() & 0x7fff) / 32768.0); data/bsdgames-2.17/phantasia/misc.c:1022:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return ((double) random() / 32768.0); data/bsdgames-2.17/phantasia/setup.c:73:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "m:")) != -1) data/bsdgames-2.17/phantasia/setup.c:85:5: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom((unsigned) time(NULL)); /* prime random numbers */ data/bsdgames-2.17/phantasia/setup.c:259:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return((double) (random() & 0x7fff) / 32768.0); data/bsdgames-2.17/phantasia/setup.c:261:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return((double) random() / 32768.0); data/bsdgames-2.17/pig/pig.c:71:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "")) != -1) data/bsdgames-2.17/ppt/ppt.c:79:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt(argc, argv, "dh")) != -1) data/bsdgames-2.17/primes/primes.c:105:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "dh")) != -1) data/bsdgames-2.17/quiz/quiz.c:91:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "i:t")) != -1) data/bsdgames-2.17/quiz/quiz.c:173:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!(pager = getenv("PAGER")) || (*pager == 0)) data/bsdgames-2.17/quiz/quiz.c:239:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(time(NULL)); data/bsdgames-2.17/quiz/quiz.c:244:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. next = random() % qsize; data/bsdgames-2.17/quiz/quiz.c:254:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (tflag && random() % 100 > 20) { data/bsdgames-2.17/rain/rain.c:82:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "d:")) != -1) data/bsdgames-2.17/rain/rain.c:110:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. xpos[j] = random() % cols + 2; data/bsdgames-2.17/rain/rain.c:111:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ypos[j] = random() % lines + 2; data/bsdgames-2.17/rain/rain.c:118:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. x = random() % cols + 2; data/bsdgames-2.17/rain/rain.c:119:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. y = random() % lines + 2; data/bsdgames-2.17/random/random.c:80:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "er")) != -1) data/bsdgames-2.17/random/random.c:115:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom((u_int)(tp.tv_usec + tp.tv_sec + getpid())); data/bsdgames-2.17/random/random.c:119:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return ((denom * random()) / MAXRANDOM); data/bsdgames-2.17/random/random.c:134:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. selected = (int)(denom * random() / MAXRANDOM) == 0; data/bsdgames-2.17/random/random.c:144:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. selected = (int)(denom * random() / MAXRANDOM) == 0; data/bsdgames-2.17/robots/main.c:165:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(getpid()); data/bsdgames-2.17/sail/dr_1.c:423:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *tp = getenv("WOTD"); data/bsdgames-2.17/sail/extern.h:53:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define dieroll() ((random()) % 6 + 1) data/bsdgames-2.17/sail/main.c:72:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom((u_long)time(NULL)); data/bsdgames-2.17/sail/main.c:86:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((a = getopt(argc, argv, "dsxlb")) != -1) data/bsdgames-2.17/sail/pl_main.c:203:26: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((nameptr = (char *) getenv("SAILNAME")) && *nameptr) data/bsdgames-2.17/snake/snake/snake.c:166:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "l:w:t")) != -1) data/bsdgames-2.17/snake/snake/snake.c:192:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom((int) tv); data/bsdgames-2.17/snake/snake/snake.c:490:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. p.col = random() % ccnt; data/bsdgames-2.17/snake/snake/snake.c:491:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. p.line = random() % lcnt; data/bsdgames-2.17/snake/snake/snake.c:642:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. vp = ((random() >> 6) & 01777) % w; data/bsdgames-2.17/snake/snake/snake.c:894:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bonus = ((random() >> 8) & 0377) % 10; data/bsdgames-2.17/tetris/screen.c:175:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((term = getenv("TERM")) == NULL) data/bsdgames-2.17/tetris/tetris.c:150:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "k:l:ps")) != -1) data/bsdgames-2.17/tetris/tetris.c:205:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom(getpid()); data/bsdgames-2.17/tetris/tetris.h:131:30: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define randshape() (&shapes[random() % 7]) data/bsdgames-2.17/trek/main.c:183:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(vect); data/bsdgames-2.17/trek/setup.c:116:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(d); data/bsdgames-2.17/worm/worm.c:105:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(getpid()); data/bsdgames-2.17/worms/worms.c:209:15: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((ch = getopt(argc, argv, "d:fl:n:t")) != -1) data/bsdgames-2.17/worms/worms.c:334:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. op->opts[(int)random() % op->nopts]; data/bsdgames-2.17/wump/wump.c:151:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt(argc, argv, "a:b:hp:r:t:d")) != -1) data/bsdgames-2.17/wump/wump.c:153:14: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((c = getopt(argc, argv, "a:b:hp:r:t:")) != -1) data/bsdgames-2.17/wump/wump.c:207:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bat_num += ((random() % (room_num / 2)) + 1); data/bsdgames-2.17/wump/wump.c:208:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. pit_num += ((random() % (room_num / 2)) + 1); data/bsdgames-2.17/wump/wump.c:308:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() % 15 == 1) data/bsdgames-2.17/wump/wump.c:362:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() % 6 == 1) { data/bsdgames-2.17/wump/wump.c:375:21: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. jump(next_room = (random() % room_num) + 1); data/bsdgames-2.17/wump/wump.c:384:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() % 12 < 2) { data/bsdgames-2.17/wump/wump.c:397:30: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. next_room = player_loc = (random() % room_num) + 1; data/bsdgames-2.17/wump/wump.c:449:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. arrow_location = (random() % room_num) + 1; data/bsdgames-2.17/wump/wump.c:453:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. link = (random() % link_num); data/bsdgames-2.17/wump/wump.c:473:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. chance = random() % 10; data/bsdgames-2.17/wump/wump.c:509:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() % level == EASY ? 12 : 9 < (lastchance += 2)) { data/bsdgames-2.17/wump/wump.c:513:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. lastchance = random() % 3; data/bsdgames-2.17/wump/wump.c:547:2: [3] (random) srandom: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srandom((int)time((time_t *)0)); data/bsdgames-2.17/wump/wump.c:560:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. delta = (random() % (room_num - 1)) + 1; data/bsdgames-2.17/wump/wump.c:573:21: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. try_again: link = (random() % room_num) + 1; data/bsdgames-2.17/wump/wump.c:579:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() % 2 == 1) data/bsdgames-2.17/wump/wump.c:633:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. loc = (random() % room_num) + 1; data/bsdgames-2.17/wump/wump.c:644:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. loc = (random() % room_num) + 1; data/bsdgames-2.17/wump/wump.c:653:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. wumpus_loc = (random() % room_num) + 1; data/bsdgames-2.17/wump/wump.c:660:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. player_loc = (random() % room_num) + 1; data/bsdgames-2.17/wump/wump.c:735:39: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. wumpus_loc = cave[wumpus_loc].tunnel[random() % link_num]; data/bsdgames-2.17/wump/wump.c:770:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (!(pager = getenv("PAGER")) || (*pager == 0)) data/bsdgames-2.17/adventure/init.c:140:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[6]; data/bsdgames-2.17/adventure/io.c:61:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char wd1buf[MAXSTR], wd2buf[MAXSTR]; data/bsdgames-2.17/adventure/io.c:258:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nbf[12]; data/bsdgames-2.17/adventure/io.c:273:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return (atoi(nbf)); /* convert it to integer */ data/bsdgames-2.17/adventure/io.c:346:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[12]; data/bsdgames-2.17/adventure/io.c:373:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). n = atoi(buf); /* newloc mod 1000 = newloc */ data/bsdgames-2.17/adventure/io.c:375:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). n = atoi(buf + len - 3); data/bsdgames-2.17/adventure/io.c:377:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). m = atoi(buf); data/bsdgames-2.17/adventure/io.c:421:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[6]; data/bsdgames-2.17/adventure/io.c:559:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tbuf, msg->seekadr, msg->txtlen + 1); /* Room to null */ data/bsdgames-2.17/adventure/io.c:570:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(numst) != 100 * skip && skip >= 0) { data/bsdgames-2.17/adventure/save.c:140:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((out = fopen(outfile, "wb")) == NULL) { data/bsdgames-2.17/adventure/save.c:169:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((in = fopen(infile, "rb")) == NULL) { data/bsdgames-2.17/adventure/setup.c:87:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((infile = fopen(argv[1], "r")) == NULL) { data/bsdgames-2.17/adventure/wizard.c:75:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char magic[6]; data/bsdgames-2.17/adventure/wizard.c:132:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname[80]; data/bsdgames-2.17/arithmetic/arithmetic.c:134:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((rangemax = atoi(optarg)) <= 0) data/bsdgames-2.17/arithmetic/arithmetic.c:201:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[80]; data/bsdgames-2.17/arithmetic/arithmetic.c:254:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(p) == result) { data/bsdgames-2.17/atc/graphics.c:116:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[BUFSIZ]; data/bsdgames-2.17/atc/graphics.c:131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[3]; data/bsdgames-2.17/atc/input.c:79:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[20]; data/bsdgames-2.17/atc/log.c:86:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s[80]; data/bsdgames-2.17/atc/log.c:89:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(s, "%dd+%02dhrs", DAY(t), HOUR(t)); data/bsdgames-2.17/atc/log.c:91:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(s, "%d:%02d:%02d", HOUR(t), MIN(t), SEC(t)); data/bsdgames-2.17/atc/log.c:93:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(s, "%d:%02d", MIN(t), SEC(t)); data/bsdgames-2.17/atc/log.c:95:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(s, ":%02d", SEC(t)); data/bsdgames-2.17/atc/log.c:110:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). score_fd = open(_PATH_SCORE, O_CREAT|O_RDWR, 0664); data/bsdgames-2.17/atc/log.c:217:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&score[num_scores - 1], data/bsdgames-2.17/atc/main.c:102:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). seed = atoi(optarg); data/bsdgames-2.17/atc/main.c:123:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/bsdgames-2.17/atc/main.c:217:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). yyin = fopen(s, "r"); data/bsdgames-2.17/atc/main.c:235:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char file[256]; data/bsdgames-2.17/atc/main.c:236:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256], games[256]; data/bsdgames-2.17/atc/main.c:241:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(games, "r")) == NULL) { data/bsdgames-2.17/atc/main.c:261:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char file[256]; data/bsdgames-2.17/atc/main.c:263:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256], games[256]; data/bsdgames-2.17/atc/main.c:268:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(games, "r")) == NULL) { data/bsdgames-2.17/atc/main.c:296:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256], games[256]; data/bsdgames-2.17/atc/main.c:302:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(games, "r")) == NULL) { data/bsdgames-2.17/atc/struct.h:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[10]; data/bsdgames-2.17/atc/struct.h:99:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[256]; data/bsdgames-2.17/atc/struct.h:100:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char game[256]; data/bsdgames-2.17/atc/update.c:202:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[80]; data/bsdgames-2.17/atc/update.c:204:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(buf, "collided with plane '%c'.", data/bsdgames-2.17/atc/update.c:225:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[50], *bp, *comm_start; data/bsdgames-2.17/atc/update.c:229:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(bp, "%c%d%c%c%d: ", name(pp), pp->altitude, data/bsdgames-2.17/atc/update.c:235:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(bp, "Holding @ A%d", pp->orig_no); data/bsdgames-2.17/atc/update.c:237:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(bp, "Circle"); data/bsdgames-2.17/atc/update.c:239:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(bp, "%d", dir_deg(pp->new_dir)); data/bsdgames-2.17/atc/update.c:243:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void)sprintf(bp, " @ B%d", pp->delayd_no); data/bsdgames-2.17/atc/update.c:248:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(bp, "---------"); data/bsdgames-2.17/atc/update.c:366:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pp, &p, sizeof (p)); data/bsdgames-2.17/backgammon/backgammon/extra.c:125:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). trace = fopen("bgtrace", "w"); data/bsdgames-2.17/backgammon/backgammon/main.c:90:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char pbuf[10]; data/bsdgames-2.17/backgammon/backgammon/move.c:46:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tests[20]; data/bsdgames-2.17/backgammon/backgammon/move.c:381:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). trace = fopen("bgtrace", "w"); data/bsdgames-2.17/backgammon/backgammon/move.c:421:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). trace = fopen("bgtrace", "w"); data/bsdgames-2.17/backgammon/common_source/back.h:72:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char args[100]; /* args passed to teachgammon and back */ data/bsdgames-2.17/backgammon/common_source/back.h:115:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char cin[100]; /* input line of current move data/bsdgames-2.17/backgammon/common_source/board.c:44:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ln[60]; data/bsdgames-2.17/backgammon/common_source/fancy.c:71:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tbuf[1024]; /* buffer for decoded termcap entries */ data/bsdgames-2.17/backgammon/common_source/fancy.c:695:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tentry[1024]; /* temporary uncoded caps buffer */ data/bsdgames-2.17/backgammon/common_source/init.c:54:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char args[100] = "-"; data/bsdgames-2.17/backgammon/common_source/init.c:75:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char args[100]; data/bsdgames-2.17/backgammon/common_source/init.c:79:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cin[100]; data/bsdgames-2.17/backgammon/common_source/save.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname[50]; data/bsdgames-2.17/backgammon/common_source/save.c:93:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fdesc = open(fname, O_RDWR)) == -1 && errno == ENOENT) { data/bsdgames-2.17/backgammon/common_source/save.c:153:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fdesc = open(s, O_RDONLY)) == -1) data/bsdgames-2.17/backgammon/common_source/subs.c:44:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outbuff[BUFSIZ]; data/bsdgames-2.17/backgammon/common_source/subs.c:142:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). trace = fopen("bgtrace", "w"); data/bsdgames-2.17/backgammon/teachgammon/tutor.h:42:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const (*com[8]); data/bsdgames-2.17/banner/banner.c:90:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char data_table[NBYTES] = { data/bsdgames-2.17/banner/banner.c:1022:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[DWIDTH]; data/bsdgames-2.17/banner/banner.c:1023:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[MAXMSG]; data/bsdgames-2.17/banner/banner.c:1024:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char print[DWIDTH]; data/bsdgames-2.17/banner/banner.c:1050:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). width = atoi(optarg); data/bsdgames-2.17/battlestar/battlestar.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mainbuf[LINELENGTH]; data/bsdgames-2.17/battlestar/command6.c:109:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). score_fp = fopen(_PATH_SCORE, "a"); data/bsdgames-2.17/battlestar/command7.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char auxbuf[LINELENGTH]; data/bsdgames-2.17/battlestar/cypher.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[10]; data/bsdgames-2.17/battlestar/extern.h:259:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char *const objdes[NUMOFOBJECTS]; data/bsdgames-2.17/battlestar/extern.h:260:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char *const objsht[NUMOFOBJECTS]; data/bsdgames-2.17/battlestar/extern.h:261:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char *const ouch[NUMOFINJURIES]; data/bsdgames-2.17/battlestar/extern.h:278:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char words[NWORD][WORDLEN]; data/bsdgames-2.17/battlestar/extern.h:309:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char beenthere[NUMOFROOMS + 1]; data/bsdgames-2.17/battlestar/extern.h:310:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char injuries[NUMOFINJURIES]; data/bsdgames-2.17/battlestar/globals.c:46:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const objdes[NUMOFOBJECTS] = { data/bsdgames-2.17/battlestar/globals.c:114:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const objsht[NUMOFOBJECTS] = { data/bsdgames-2.17/battlestar/globals.c:181:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const ouch[NUMOFINJURIES] = { data/bsdgames-2.17/battlestar/globals.c:246:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char words[NWORD][WORDLEN]; data/bsdgames-2.17/battlestar/globals.c:272:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char beenthere[NUMOFROOMS + 1]; data/bsdgames-2.17/battlestar/globals.c:273:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char injuries[NUMOFINJURIES]; data/bsdgames-2.17/battlestar/parse.c:162:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpword[WORDLEN]; data/bsdgames-2.17/battlestar/save.c:53:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(filename, "r")) == 0) { data/bsdgames-2.17/battlestar/save.c:106:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(filename, "w")) == NULL) { data/bsdgames-2.17/battlestar/save.c:173:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newname, filename, len); data/bsdgames-2.17/battlestar/save.c:184:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newname, home, tmpl); data/bsdgames-2.17/battlestar/save.c:186:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newname + tmpl + 1, filename, len); data/bsdgames-2.17/battlestar/save.c:194:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newname, filename, len); data/bsdgames-2.17/bcd/bcd.c:135:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cardline[80]; data/bsdgames-2.17/boggle/boggle/bog.c:95:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char board[17]; data/bsdgames-2.17/boggle/boggle/bog.c:100:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *pword[MAXPWORDS]; data/bsdgames-2.17/boggle/boggle/bog.c:101:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pwords[MAXPSPACE], *pwordsp; data/bsdgames-2.17/boggle/boggle/bog.c:104:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *mword[MAXMWORDS]; data/bsdgames-2.17/boggle/boggle/bog.c:105:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mwords[MAXMSPACE], *mwordsp; data/bsdgames-2.17/boggle/boggle/bog.c:152:11: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). seed = atol(optarg); data/bsdgames-2.17/boggle/boggle/bog.c:155:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((tlimit = atoi(optarg)) < 1) data/bsdgames-2.17/boggle/boggle/bog.c:159:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((minlength = atoi(optarg)) < 3) data/bsdgames-2.17/boggle/boggle/bog.c:317:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXWORDLEN + 1]; data/bsdgames-2.17/boggle/boggle/bog.c:455:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subword[MAXWORDLEN + 1]; data/bsdgames-2.17/boggle/boggle/bog.c:639:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *cubes[16] = { data/bsdgames-2.17/boggle/boggle/help.c:57:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/bsdgames-2.17/boggle/boggle/help.c:59:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(HELPFILE, "r")) == NULL) data/bsdgames-2.17/boggle/boggle/mach.c:406:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXWORDLEN + 1]; data/bsdgames-2.17/boggle/boggle/word.c:73:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAXWORDLEN + 1]; data/bsdgames-2.17/boggle/boggle/word.c:132:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(dict, "r")) == NULL) data/bsdgames-2.17/boggle/boggle/word.c:192:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/bsdgames-2.17/boggle/boggle/word.c:195:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(indexfile, "r")) == NULL) { data/bsdgames-2.17/boggle/boggle/word.c:210:24: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dictindex[j].start = atol(buf + 1); data/bsdgames-2.17/boggle/boggle/word.c:211:25: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dictindex[j].length = atol(buf + 9) - dictindex[j].start; data/bsdgames-2.17/boggle/mkdict/mkdict.c:72:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2][MAXWORDLEN + 1]; data/bsdgames-2.17/boggle/mkdict/mkdict.c:106:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (argc == 2 && nwords % atoi(argv[1])) data/bsdgames-2.17/boggle/mkindex/mkindex.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXWORDLEN + 1]; data/bsdgames-2.17/boggle/mkindex/mkindex.c:106:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAXWORDLEN + 1]; data/bsdgames-2.17/caesar/caesar.c:156:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((rot = atoi(arg)) < 0) data/bsdgames-2.17/canfield/canfield/canfield.c:158:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char suitmap[4] = {spades, clubs, hearts, diamonds}; data/bsdgames-2.17/canfield/canfield/canfield.c:159:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char colormap[4] = {black, black, red, red}; data/bsdgames-2.17/canfield/canfield/canfield.c:160:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pilemap[4] = {atabcol, btabcol, ctabcol, dtabcol}; data/bsdgames-2.17/canfield/canfield/canfield.c:1370:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[2] = { '\0', '\0'}, ch; data/bsdgames-2.17/canfield/canfield/canfield.c:1682:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dbfd = open(_PATH_SCORE, O_RDWR); data/bsdgames-2.17/canfield/cfscores/cfscores.c:87:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). dbfd = open(_PATH_SCORE, O_RDONLY); data/bsdgames-2.17/cribbage/crib.c:72:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(_PATH_LOG, "a"); data/bsdgames-2.17/cribbage/extern.c:51:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char explan[128]; /* explanation */ data/bsdgames-2.17/cribbage/instr.c:66:16: [2] (race) vfork: On some old systems, vfork() permits race conditions, and it's very difficult to use correctly (CWE-362). Use fork() instead. switch (pid = vfork()) { data/bsdgames-2.17/cribbage/instr.c:80:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(_PATH_INSTR, O_RDONLY)) == -1) { data/bsdgames-2.17/cribbage/io.c:61:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuf[LINESIZE]; data/bsdgames-2.17/cribbage/io.c:63:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const rankname[RANKS] = { data/bsdgames-2.17/cribbage/io.c:68:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const rankchar[RANKS] = { data/bsdgames-2.17/cribbage/io.c:72:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const suitname[SUITS] = {"SPADES", "HEARTS", "DIAMONDS", "CLUBS"}; data/bsdgames-2.17/cribbage/io.c:74:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const suitchar[SUITS] = {"S", "H", "D", "C"}; data/bsdgames-2.17/cribbage/io.c:381:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Msgbuf[BUFSIZ] = {'\0'}; data/bsdgames-2.17/cribbage/score.c:119:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/bsdgames-2.17/cribbage/score.c:131:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(explan, "His Nobs"); data/bsdgames-2.17/cribbage/score.c:138:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(explan, ", "); data/bsdgames-2.17/cribbage/score.c:142:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(explan, "Five-flush"); data/bsdgames-2.17/cribbage/score.c:147:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(explan, ", Four-flush"); data/bsdgames-2.17/cribbage/score.c:149:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(explan, "Four-flush"); data/bsdgames-2.17/cribbage/score.c:153:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(explan, ", "); data/bsdgames-2.17/cribbage/score.c:160:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buf, "%d points in fifteens", i); data/bsdgames-2.17/cribbage/score.c:163:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(explan, "No fifteens"); data/bsdgames-2.17/cribbage/score.c:169:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buf, ", %d points in pairs, %d in runs", data/bsdgames-2.17/cribbage/score.c:173:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(explan, ", No pairs/runs"); data/bsdgames-2.17/cribbage/support.c:131:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char prompt[BUFSIZ]; data/bsdgames-2.17/dab/board.cc:80:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (void) memcpy(_b[y], b._b[y], _tx * sizeof(int)); data/bsdgames-2.17/dab/main.cc:127:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nn = atoi(optarg); data/bsdgames-2.17/dab/main.cc:142:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ny = nx = atoi(argv[optind]); data/bsdgames-2.17/dab/main.cc:146:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nx = atoi(argv[optind]); data/bsdgames-2.17/dab/main.cc:147:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ny = atoi(argv[optind+1]); data/bsdgames-2.17/dm/dm.c:113:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pbuf[MAXPATHLEN]; data/bsdgames-2.17/dm/dm.c:130:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lbuf[BUFSIZ], f1[40], f2[40], f3[40], f4[40], f5[40]; data/bsdgames-2.17/dm/dm.c:132:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(cfp = fopen(_PATH_CONFIG, "r"))) data/bsdgames-2.17/dm/dm.c:178:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). start = atoi(s_start); data/bsdgames-2.17/dm/dm.c:179:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). stop = atoi(s_stop); data/bsdgames-2.17/dm/dm.c:224:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (isdigit((unsigned char)*s_load) && atoi(s_load) < load()) data/bsdgames-2.17/dm/dm.c:226:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (isdigit((unsigned char)*s_users) && atoi(s_users) <= users()) data/bsdgames-2.17/dm/dm.c:229:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). priority = atoi(s_priority); data/bsdgames-2.17/dm/dm.c:271:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/bsdgames-2.17/dm/dm.c:273:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(_PATH_NOGAMES, O_RDONLY, 0)) >= 0) { data/bsdgames-2.17/dm/dm.c:314:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (lp = fopen(_PATH_LOG, "a")) { data/bsdgames-2.17/dm/utmpentry.h:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[65]; data/bsdgames-2.17/dm/utmpentry.h:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[65]; data/bsdgames-2.17/dm/utmpentry.h:42:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[257]; data/bsdgames-2.17/factor/factor.c:139:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *p, buf[LINE_MAX]; /* > max number of digits. */ data/bsdgames-2.17/fish/fish.c:157:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/bsdgames-2.17/fish/fish.c:471:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(_PATH_INSTR, O_RDONLY)) == -1) data/bsdgames-2.17/fortune/fortune/fortune.c:197:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Re_error[1024]; data/bsdgames-2.17/fortune/fortune/fortune.c:300:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[BUFSIZ]; data/bsdgames-2.17/fortune/fortune/fortune.c:321:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[BUFSIZ]; data/bsdgames-2.17/fortune/fortune/fortune.c:550:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(path, O_RDONLY)) < 0) { data/bsdgames-2.17/fortune/fortune/fortune.c:665:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. return strcat(new, "-o"); data/bsdgames-2.17/fortune/fortune/fortune.c:703:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(offensive, O_RDONLY)) < 0) data/bsdgames-2.17/fortune/fortune/fortune.c:846:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(datfile, ".dat"); data/bsdgames-2.17/fortune/fortune/fortune.c:859:10: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. (void) strcat(*posp, ".pos"); data/bsdgames-2.17/fortune/fortune/fortune.c:1123:36: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (fp->datfd < 0 && (fp->datfd = open(fp->datfile, O_RDONLY)) < 0) data/bsdgames-2.17/fortune/fortune/fortune.c:1143:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(fp->posfile, O_RDONLY)) < 0 || data/bsdgames-2.17/fortune/fortune/fortune.c:1174:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(fp->datfile, O_RDONLY)) < 0) data/bsdgames-2.17/fortune/strfile/strfile.c:72:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char c[4]; data/bsdgames-2.17/fortune/strfile/strfile.c:79:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rv, c, sizeof rv); data/bsdgames-2.17/fortune/strfile/strfile.c:184:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[257]; data/bsdgames-2.17/fortune/strfile/strfile.c:192:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((inf = fopen(Infile, "r")) == NULL) data/bsdgames-2.17/fortune/strfile/strfile.c:195:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((outf = fopen(Outfile, "w")) == NULL) data/bsdgames-2.17/fortune/strfile/strfile.c:337:10: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. (void) strcat(Outfile, ".dat"); data/bsdgames-2.17/fortune/strfile/strfile.c:399:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). Sort_1 = fopen(Infile, "r"); data/bsdgames-2.17/fortune/strfile/strfile.c:400:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). Sort_2 = fopen(Infile, "r"); data/bsdgames-2.17/fortune/strfile/strfile.c:503:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char c[8]; data/bsdgames-2.17/fortune/strfile/strfile.h:52:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char stuff[4]; /* long aligned space */ data/bsdgames-2.17/fortune/unstr/unstr.c:95:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((Inf = fopen(Infile, "r")) == NULL) data/bsdgames-2.17/fortune/unstr/unstr.c:97:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((Dataf = fopen(Datafile, "r")) == NULL) data/bsdgames-2.17/fortune/unstr/unstr.c:126:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. (void) strcat(Datafile, ".dat"); data/bsdgames-2.17/fortune/unstr/unstr.c:136:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/bsdgames-2.17/gomoku/main.c:70:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char pdir[4] = "-\\|/"; data/bsdgames-2.17/gomoku/main.c:71:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fmtbuf[128]; data/bsdgames-2.17/gomoku/main.c:80:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *plyr[2]; /* who's who */ data/bsdgames-2.17/gomoku/main.c:89:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/bsdgames-2.17/gomoku/main.c:92:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *const fmt[2] = { data/bsdgames-2.17/gomoku/main.c:117:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((debugfp = fopen(optarg, "w")) == NULL) data/bsdgames-2.17/gomoku/main.c:131:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((inputfp = fopen(*argv, "r")) == NULL) data/bsdgames-2.17/gomoku/main.c:260:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(buf, "w")) == NULL) { data/bsdgames-2.17/gomoku/main.c:320:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(buf, "w")) == NULL) { data/bsdgames-2.17/gomoku/main.c:379:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fmtbuf, "Debug set to %d", debug); data/bsdgames-2.17/gomoku/main.c:408:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(fmtbuf + 1, "w")) == NULL) data/bsdgames-2.17/gomoku/pickmove.c:320:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(forcemap, tmpmap, sizeof(tmpmap)); data/bsdgames-2.17/gomoku/pickmove.c:337:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fmtbuf, "%cL%d %d %d %d", "BW"[color], data/bsdgames-2.17/gomoku/pickmove.c:396:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fmtbuf, "scanframes: %c combocnt %d", "BW"[color], data/bsdgames-2.17/gomoku/pickmove.c:402:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fmtbuf, "scanframes: %c elistcnt %d", "BW"[color], data/bsdgames-2.17/gomoku/pickmove.c:512:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fmtbuf, "%c c %d %d m %x %x o %d %d", data/bsdgames-2.17/gomoku/pickmove.c:764:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fmtbuf, "%c v%d i%d d%d c %d %d m %x %x o %d %d", data/bsdgames-2.17/gomoku/pickmove.c:811:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fmtbuf, "E%c ", "bw"[curcolor]); data/bsdgames-2.17/gomoku/pickmove.c:1035:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(forcemap, tmpmap, sizeof(tmpmap)); data/bsdgames-2.17/gomoku/pickmove.c:1296:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fmtbuf, "sort1: n%d", n); data/bsdgames-2.17/gomoku/pickmove.c:1344:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(str, "%x/%d", cbp->c_combo.s, cbp->c_nframes); data/bsdgames-2.17/gomoku/pickmove.c:1471:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). clearcombo(cbp, open) data/bsdgames-2.17/gomoku/pickmove.c:1473:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int open; data/bsdgames-2.17/gomoku/pickmove.c:1486:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). n = open ? 6 : 5; data/bsdgames-2.17/gomoku/stoc.c:69:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[32]; data/bsdgames-2.17/gomoku/stoc.c:75:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%c%d", letters[s % BSZ1], s / BSZ1); data/bsdgames-2.17/gomoku/stoc.c:93:6: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi(&mp[1]); data/bsdgames-2.17/hack/def.eshk.h:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char customer[PL_NSIZ]; /* most recent customer */ data/bsdgames-2.17/hack/def.eshk.h:86:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shknam[PL_NSIZ]; data/bsdgames-2.17/hack/hack.Decl.c:70:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nul[40]; /* contains zeros */ data/bsdgames-2.17/hack/hack.Decl.c:71:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char plname[PL_NSIZ];/* player name */ data/bsdgames-2.17/hack/hack.Decl.c:72:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lock[PL_NSIZ + 4] = "1lock"; /* long enough for login name data/bsdgames-2.17/hack/hack.Decl.c:102:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char genocided[60]; data/bsdgames-2.17/hack/hack.Decl.c:103:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fut_geno[60]; data/bsdgames-2.17/hack/hack.apply.c:449:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirsyms[12]; data/bsdgames-2.17/hack/hack.bones.c:91:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(bones, O_RDONLY)) >= 0) { data/bsdgames-2.17/hack/hack.bones.c:158:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(bones, O_RDONLY)) < 0) data/bsdgames-2.17/hack/hack.cmd.c:229:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expcmd[10]; data/bsdgames-2.17/hack/hack.cmd.c:249:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.do.c:245:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(lock, O_RDONLY)) < 0) { data/bsdgames-2.17/hack/hack.do_name.c:117:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.do_name.c:174:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.do_name.c:240:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.do_name.c:274:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[BUFSZ]; /* %% */ data/bsdgames-2.17/hack/hack.do_name.c:304:10: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. (void) strcat(buf, " called "); data/bsdgames-2.17/hack/hack.do_name.c:340:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[BUFSZ]; /* %% */ data/bsdgames-2.17/hack/hack.do_name.c:375:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ccc[3]; data/bsdgames-2.17/hack/hack.eat.c:332:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char msgbuf[BUFSZ]; data/bsdgames-2.17/hack/hack.end.c:131:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.end.c:313:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[NAMSZ + 1]; data/bsdgames-2.17/hack/hack.end.c:314:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char death[DTHSZ + 1]; data/bsdgames-2.17/hack/hack.end.c:315:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char date[7];/* yymmdd */ data/bsdgames-2.17/hack/hack.end.c:343:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(rfile = fopen(recfile, "r"))) { data/bsdgames-2.17/hack/hack.end.c:422:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(rfile = fopen(recfile, "w"))) { data/bsdgames-2.17/hack/hack.end.c:487:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuf[BUFSZ]; data/bsdgames-2.17/hack/hack.end.c:489:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void) strcpy(linebuf, "Number Points Name"); data/bsdgames-2.17/hack/hack.end.c:493:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void) strcpy(bp, "Hp [max]"); data/bsdgames-2.17/hack/hack.end.c:502:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuf[BUFSZ]; data/bsdgames-2.17/hack/hack.end.c:549:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hpbuf[10]; data/bsdgames-2.17/hack/hack.end.c:581:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[12]; data/bsdgames-2.17/hack/hack.end.c:658:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char totchars[10]; data/bsdgames-2.17/hack/hack.end.c:668:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(rfile = fopen(recfile, "r"))) { data/bsdgames-2.17/hack/hack.end.c:721:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (digit(players[i][0]) && rank <= atoi(players[i]))) data/bsdgames-2.17/hack/hack.end.c:758:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (digit(players[i][0]) && rank <= atoi(players[i]))) { data/bsdgames-2.17/hack/hack.engrave.c:211:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.fight.c:99:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.fight.c:198:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.h:203:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char fut_geno[60]; /* idem */ data/bsdgames-2.17/hack/hack.h:204:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char genocided[60]; /* defined in Decl.c */ data/bsdgames-2.17/hack/hack.h:209:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char plname[PL_NSIZ], pl_character[PL_CSIZ]; data/bsdgames-2.17/hack/hack.invent.c:399:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.invent.c:400:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lets[BUFSZ]; data/bsdgames-2.17/hack/hack.invent.c:572:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.invent.c:577:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char olets[20], ilets[20]; data/bsdgames-2.17/hack/hack.invent.c:728:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char li[BUFSZ]; data/bsdgames-2.17/hack/hack.invent.c:752:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char any[BUFSZ]; data/bsdgames-2.17/hack/hack.invent.c:782:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stuff[BUFSZ]; data/bsdgames-2.17/hack/hack.invent.c:892:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gbuf[30]; data/bsdgames-2.17/hack/hack.invent.c:999:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lets[6]; data/bsdgames-2.17/hack/hack.invent.c:1024:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lets[3]; data/bsdgames-2.17/hack/hack.main.c:91:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char SAVEF[PL_NSIZ + 11] = "save/"; /* save/99999player */ data/bsdgames-2.17/hack/hack.main.c:93:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char obuf[BUFSIZ]; /* BUFSIZ is defined in stdio.h */ data/bsdgames-2.17/hack/hack.main.c:109:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("/dev/null", O_RDONLY); data/bsdgames-2.17/hack/hack.main.c:244:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). locknum = atoi(argv[1]); data/bsdgames-2.17/hack/hack.main.c:260:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void) strcpy(plname, "wizard"); data/bsdgames-2.17/hack/hack.main.c:313:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(SAVEF, O_RDONLY)) >= 0 && data/bsdgames-2.17/hack/hack.main.c:489:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(tf, ".%d", foo); data/bsdgames-2.17/hack/hack.main.c:571:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(RECORD, O_RDWR)) < 0) { data/bsdgames-2.17/hack/hack.objnam.c:95:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[13]; data/bsdgames-2.17/hack/hack.objnam.c:104:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.objnam.c:155:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char bufr[BUFSZ]; data/bsdgames-2.17/hack/hack.objnam.c:320:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix[PREFIX]; data/bsdgames-2.17/hack/hack.objnam.c:382:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix[PREFIX]; data/bsdgames-2.17/hack/hack.objnam.c:443:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cnt = atoi(bp); data/bsdgames-2.17/hack/hack.objnam.c:454:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). spe = atoi(bp); data/bsdgames-2.17/hack/hack.objnam.c:467:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). spe = atoi(p); data/bsdgames-2.17/hack/hack.options.c:182:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi(op); data/bsdgames-2.17/hack/hack.options.c:242:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.options.c:247:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void) strcpy(buf, "HACKOPTIONS="); data/bsdgames-2.17/hack/hack.options.c:250:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. (void) strcat(buf, "standout,"); data/bsdgames-2.17/hack/hack.options.c:252:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. (void) strcat(buf, "nonull,"); data/bsdgames-2.17/hack/hack.options.c:254:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. (void) strcat(buf, "nonews,"); data/bsdgames-2.17/hack/hack.options.c:256:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. (void) strcat(buf, "time,"); data/bsdgames-2.17/hack/hack.options.c:258:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. (void) strcat(buf, "notombstone,"); data/bsdgames-2.17/hack/hack.options.c:260:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. (void) strcat(buf, "!rest_on_space,"); data/bsdgames-2.17/hack/hack.options.c:262:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(eos(buf), "endgame: %u topscores/%u around me", data/bsdgames-2.17/hack/hack.options.c:265:12: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. (void) strcat(buf, "/own scores"); data/bsdgames-2.17/hack/hack.pager.c:86:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bufr[BUFSZ + 6]; data/bsdgames-2.17/hack/hack.pager.c:89:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!(fp = fopen(DATAFILE, "r"))) data/bsdgames-2.17/hack/hack.pager.c:374:24: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(fnam, O_RDONLY); data/bsdgames-2.17/hack/hack.pager.c:405:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen(fnam, "r")) == (FILE *) 0) { data/bsdgames-2.17/hack/hack.pri.c:718:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oldbot[100], newbot[100]; data/bsdgames-2.17/hack/hack.pri.c:738:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(newbot, data/bsdgames-2.17/hack/hack.pri.c:742:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(newbot, data/bsdgames-2.17/hack/hack.pri.c:748:11: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. (void) strcat(newbot, "18/**"); data/bsdgames-2.17/hack/hack.pri.c:750:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(eos(newbot), "18/%02d", u.ustr - 18); data/bsdgames-2.17/hack/hack.pri.c:752:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(eos(newbot), "%-2d ", u.ustr); data/bsdgames-2.17/hack/hack.pri.c:754:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(eos(newbot), " Exp %2d/%-5lu ", u.ulevel, u.uexp); data/bsdgames-2.17/hack/hack.pri.c:756:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(eos(newbot), " Exp %2u ", u.ulevel); data/bsdgames-2.17/hack/hack.pri.c:760:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(eos(newbot), " %ld", moves); data/bsdgames-2.17/hack/hack.read.c:253:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.rip.c:89:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.rip.c:97:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buf, "%ld AU", u.ugold); data/bsdgames-2.17/hack/hack.rip.c:121:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buf, "%4d", getyear()); data/bsdgames-2.17/hack/hack.rumors.c:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[COLNO]; data/bsdgames-2.17/hack/hack.rumors.c:108:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[COLNO]; data/bsdgames-2.17/hack/hack.rumors.c:124:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). (rumf = fopen(RUMORFILE, "r")) == (FILE *) 0) data/bsdgames-2.17/hack/hack.save.c:137:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((ofd = open(lock, O_RDONLY)) < 0) { data/bsdgames-2.17/hack/hack.shk.c:806:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.shk.c:846:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(&buf[cnt], " %5ld zorkmids", thisused); data/bsdgames-2.17/hack/hack.shk.c:851:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buf, "Total:%50ld zorkmids", totused); data/bsdgames-2.17/hack/hack.shknam.c:225:12: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void) strcpy(nampt, "Dirk"); data/bsdgames-2.17/hack/hack.termcap.c:79:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tbuf[512]; data/bsdgames-2.17/hack/hack.topl.c:73:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char toplines[BUFSZ]; data/bsdgames-2.17/hack/hack.topl.c:217:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pbuf[BUFSZ]; data/bsdgames-2.17/hack/hack.topl.c:238:10: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. (void) strcat(toplines, " "); data/bsdgames-2.17/hack/hack.trap.c:484:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.trap.c:490:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newlevel = atoi(buf); data/bsdgames-2.17/hack/hack.tty.c:317:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char inputline[COLNO]; data/bsdgames-2.17/hack/hack.u_init.c:81:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pl_character[PL_CSIZ]; data/bsdgames-2.17/hack/hack.u_init.c:88:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rolesyms[NR_OF_ROLES + 1]; /* filled by u_init() */ data/bsdgames-2.17/hack/hack.u_init.c:398:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = atoi(ep); data/bsdgames-2.17/hack/hack.unix.c:123:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char datestr[7]; data/bsdgames-2.17/hack/hack.unix.c:126:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(datestr, "%02d%02d%02d", data/bsdgames-2.17/hack/hack.unix.c:188:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAXPATHLEN + 1]; data/bsdgames-2.17/hack/hack.unix.c:307:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(lock, O_RDONLY)) == -1) { data/bsdgames-2.17/hack/hack.vault.c:177:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/hack.zap.c:241:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSZ]; data/bsdgames-2.17/hack/makedefs.c:80:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[STRSZ]; data/bsdgames-2.17/hack/makedefs.c:104:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(argv[1], O_RDONLY)) < 0) { data/bsdgames-2.17/hack/makedefs.c:143:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[LINSZ], *lp = line, *lp0 = line, *lpe = line; data/bsdgames-2.17/hack/makedefs.c:214:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char identif[NSZ], *ip; data/bsdgames-2.17/hangman/extern.c:45:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Word[BUFSIZ], Known[BUFSIZ]; data/bsdgames-2.17/hangman/main.c:68:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). Minlen = atoi(optarg); data/bsdgames-2.17/hangman/setup.c:71:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((Dict = fopen(Dict_name, "r")) == NULL) { data/bsdgames-2.17/hunt/hunt/hunt.c:87:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Buf[BUFSIZ]; data/bsdgames-2.17/hunt/hunt/hunt.c:105:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map_key[256]; /* what to map keys to */ data/bsdgames-2.17/hunt/hunt/hunt.c:108:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[NAMELEN]; data/bsdgames-2.17/hunt/hunt/hunt.c:187:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). Test_port = atoi(use_port); data/bsdgames-2.17/hunt/hunt/hunt.c:412:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(*vector)[vec_cnt++], ip->ifa_broadaddr, data/bsdgames-2.17/hunt/hunt/hunt.c:429:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char local_name[MAXHOSTNAMELEN + 1]; data/bsdgames-2.17/hunt/hunt/hunt.c:617:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/bsdgames-2.17/hunt/hunt/hunt.c:628:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(buf, "%8c %.64s", 'a' + i, data/bsdgames-2.17/hunt/hunt/hunt.c:664:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/bsdgames-2.17/hunt/hunt/hunt.c:1039:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). Test_port = atoi(use_port); data/bsdgames-2.17/hunt/hunt/otto.c:74:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char screen[SCREEN_HEIGHT][SCREEN_WIDTH2]; data/bsdgames-2.17/hunt/hunt/otto.c:112:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. STATIC char command[BUFSIZ]; data/bsdgames-2.17/hunt/hunt/otto.c:142:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. STATIC char been_there[HEIGHT][WIDTH2]; data/bsdgames-2.17/hunt/hunt/otto.c:173:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). debug = fopen("bug", "w"); data/bsdgames-2.17/hunt/hunt/otto.c:447:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(flbr, items, sizeof flbr); data/bsdgames-2.17/hunt/hunt/playit.c:71:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char screen[SCREEN_HEIGHT][SCREEN_WIDTH2], blanks[SCREEN_WIDTH]; data/bsdgames-2.17/hunt/hunt/playit.c:90:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char ibuf[256], *iptr = ibuf; data/bsdgames-2.17/hunt/hunt/playit.c:286:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char inp[sizeof Buf]; data/bsdgames-2.17/hunt/hunt/playit.c:380:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[WIDTH + WIDTH % 2]; data/bsdgames-2.17/hunt/hunt/playit.c:551:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(screen[i], blanks, SCREEN_WIDTH); data/bsdgames-2.17/hunt/hunt/playit.c:584:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&screen[cur_row][cur_col], blanks, SCREEN_WIDTH - cur_col); data/bsdgames-2.17/hunt/huntd/answer.c:48:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char Ttyname[NAMELEN]; data/bsdgames-2.17/hunt/huntd/answer.c:56:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[NAMELEN]; data/bsdgames-2.17/hunt/huntd/answer.c:125:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ + 1]; data/bsdgames-2.17/hunt/huntd/answer.c:207:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pp->p_maze, Maze, sizeof Maze); data/bsdgames-2.17/hunt/huntd/answer.c:211:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%5.5s%c%-10.10s %c", " ", stat_char(pp), data/bsdgames-2.17/hunt/huntd/answer.c:315:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%5.2f%c%-10.10s %c", newpp->p_ident->i_score, data/bsdgames-2.17/hunt/huntd/answer.c:321:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char smallbuf[10]; data/bsdgames-2.17/hunt/huntd/answer.c:327:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(smallbuf, "%3d", pp->p_ammo); data/bsdgames-2.17/hunt/huntd/draw.c:82:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%3d", pp->p_ammo); data/bsdgames-2.17/hunt/huntd/draw.c:93:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%2d/%2d", pp->p_damage, pp->p_damcap); data/bsdgames-2.17/hunt/huntd/draw.c:99:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%3d", (pp->p_damcap - MAXDAM) / 2); data/bsdgames-2.17/hunt/huntd/draw.c:106:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%5.2f%c%-10.10s %c", np->p_ident->i_score, data/bsdgames-2.17/hunt/huntd/draw.c:117:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%5.5s %-10.10s %c", " ", data/bsdgames-2.17/hunt/huntd/draw.c:270:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ch = ((char *) Maze)[index]; data/bsdgames-2.17/hunt/huntd/driver.c:117:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). Test_port = atoi(optarg); data/bsdgames-2.17/hunt/huntd/driver.c:502:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%2d", ouch->p_damage); data/bsdgames-2.17/hunt/huntd/driver.c:584:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%2d/%2d", gotcha->p_damage, gotcha->p_damcap); data/bsdgames-2.17/hunt/huntd/driver.c:587:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%3d", (gotcha->p_damcap - MAXDAM) / 2); data/bsdgames-2.17/hunt/huntd/driver.c:590:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%5.2f", gotcha->p_ident->i_score); data/bsdgames-2.17/hunt/huntd/driver.c:756:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pp, End_player, sizeof (PLAYER)); data/bsdgames-2.17/hunt/huntd/driver.c:759:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%5.2f%c%-10.10s %c", data/bsdgames-2.17/hunt/huntd/driver.c:795:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pp, End_monitor, sizeof (PLAYER)); data/bsdgames-2.17/hunt/huntd/driver.c:798:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%5.5s %-10.10s %c", " ", data/bsdgames-2.17/hunt/huntd/execute.c:67:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void) strcpy(pp->p_death, "| Quit |"); data/bsdgames-2.17/hunt/huntd/execute.c:92:11: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void) strcpy(pp->p_death, "| Quit |"); data/bsdgames-2.17/hunt/huntd/execute.c:185:10: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. (void) strcpy(pp->p_death, "| Quit |"); data/bsdgames-2.17/hunt/huntd/execute.c:369:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%3d", pp->p_ammo); data/bsdgames-2.17/hunt/huntd/execute.c:418:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%3d", pp->p_ammo); data/bsdgames-2.17/hunt/huntd/execute.c:539:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%3d", --pp->p_ammo); data/bsdgames-2.17/hunt/huntd/execute.c:563:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%3d", --pp->p_ammo); data/bsdgames-2.17/hunt/huntd/execute.c:603:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%3d", pp->p_ammo); data/bsdgames-2.17/hunt/huntd/extern.c:44:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Buf[BUFSIZ]; /* general scribbling buffer */ data/bsdgames-2.17/hunt/huntd/extern.c:45:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Maze[HEIGHT][WIDTH2]; /* the maze */ data/bsdgames-2.17/hunt/huntd/extern.c:46:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Orig_maze[HEIGHT][WIDTH2]; /* the original maze */ data/bsdgames-2.17/hunt/huntd/faketalk.c:91:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFSIZ]; data/bsdgames-2.17/hunt/huntd/get_names.c:55:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char hostname[MAXHOSTNAMELEN + 1]; data/bsdgames-2.17/hunt/huntd/get_names.c:97:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&my_machine_addr, hp->h_addr, hp->h_length); data/bsdgames-2.17/hunt/huntd/get_names.c:155:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&his_machine_addr, &my_machine_addr, data/bsdgames-2.17/hunt/huntd/get_names.c:162:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&his_machine_addr, hp->h_addr, hp->h_length); data/bsdgames-2.17/hunt/huntd/hunt.h:292:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char i_name[NAMELEN]; data/bsdgames-2.17/hunt/huntd/hunt.h:335:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p_death[MSGLEN]; data/bsdgames-2.17/hunt/huntd/hunt.h:336:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p_maze[HEIGHT][WIDTH2]; data/bsdgames-2.17/hunt/huntd/hunt.h:339:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p_cbuf[BUFSIZ]; data/bsdgames-2.17/hunt/huntd/hunt.h:372:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char Buf[BUFSIZ], Maze[HEIGHT][WIDTH2], Orig_maze[HEIGHT][WIDTH2]; data/bsdgames-2.17/hunt/huntd/hunt.h:412:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char map_key[256]; data/bsdgames-2.17/hunt/huntd/makemaze.c:232:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(Orig_maze, Maze, sizeof Maze); data/bsdgames-2.17/hunt/huntd/shots.c:319:12: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%3d", pp->p_ammo); data/bsdgames-2.17/hunt/huntd/shots.c:500:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(Buf, "%3d", pp->p_ammo); data/bsdgames-2.17/hunt/huntd/talk_ctl.h:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char l_name[NAME_SIZE]; data/bsdgames-2.17/hunt/huntd/talk_ctl.h:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char r_name[NAME_SIZE]; data/bsdgames-2.17/hunt/huntd/talk_ctl.h:80:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char r_tty[TTY_SIZE]; data/bsdgames-2.17/lib/getloadavg.c:42:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen("/proc/loadavg", "r"); data/bsdgames-2.17/mille/extern.c:54:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Initstr[100]; /* initial string for error field */ data/bsdgames-2.17/mille/mille.c:64:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). outf = fopen("q", "w"); data/bsdgames-2.17/mille/move.c:439:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/bsdgames-2.17/mille/move.c:466:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((outf = fopen(buf, "w")) == NULL) data/bsdgames-2.17/mille/save.c:65:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/bsdgames-2.17/mille/save.c:150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/bsdgames-2.17/mille/save.c:153:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((inf = open(file, O_RDONLY)) < 0) { data/bsdgames-2.17/mille/varpush.c:90:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/bsdgames-2.17/mille/varpush.c:94:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((outf = fopen(buf, "w")) == NULL) { data/bsdgames-2.17/monop/cards.c:72:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((deckf=fopen(cardfile, "r")) == NULL) { data/bsdgames-2.17/monop/execute.c:55:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[257]; data/bsdgames-2.17/monop/execute.c:245:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/bsdgames-2.17/monop/execute.c:249:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((inf=open(file, O_RDONLY)) < 0) { data/bsdgames-2.17/monop/getinp.c:48:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[257]; data/bsdgames-2.17/monop/houses.c:43:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *names[N_MON+2]; data/bsdgames-2.17/monop/houses.c:44:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cur_prop[80]; data/bsdgames-2.17/monop/initdeck.c:61:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char c[4]; data/bsdgames-2.17/monop/initdeck.c:68:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rv, c, sizeof rv); data/bsdgames-2.17/monop/initdeck.c:117:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((inf = fopen(infile, "r")) == NULL) { data/bsdgames-2.17/monop/initdeck.c:132:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((outf = fopen(outfile, "w")) == NULL) { data/bsdgames-2.17/monop/initdeck.c:269:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char c[8]; data/bsdgames-2.17/monop/misc.c:100:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[257]; data/bsdgames-2.17/monop/monop.c:109:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[257]; data/bsdgames-2.17/monop/monop.h:93:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char sqnums[3]; /* Square numbers (used to init)*/ data/bsdgames-2.17/monop/morg.c:47:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *names[MAX_PRP+2], data/bsdgames-2.17/monop/prop.c:168:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/bsdgames-2.17/monop/trade.c:52:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *plist[MAX_PRP+2]; data/bsdgames-2.17/morse/morse.c:154:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char foo[10]; /* All morse chars shorter than this */ data/bsdgames-2.17/number/number.c:94:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/bsdgames-2.17/phantasia/fight.c:863:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(Curmonster.m_name, "Morgoth"); data/bsdgames-2.17/phantasia/gamesupport.c:15:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char flag[2] = /* for printing values of bools */ data/bsdgames-2.17/phantasia/gamesupport.c:462:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(_PATH_SCORE, "r")) != NULL) { data/bsdgames-2.17/phantasia/gamesupport.c:521:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(_PATH_SCORE, "r+")) != NULL) { data/bsdgames-2.17/phantasia/interplayer.c:643:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(_PATH_MESS, "w"); data/bsdgames-2.17/phantasia/interplayer.c:650:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(_PATH_VOID, "w"); data/bsdgames-2.17/phantasia/interplayer.c:719:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(_PATH_GOLD, "r+")) != NULL) data/bsdgames-2.17/phantasia/io.c:103:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[81]; /* a place to store data already on screen */ data/bsdgames-2.17/phantasia/main.c:293:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((Playersfp = fopen(_PATH_PEOPLE, "r+")) == NULL) data/bsdgames-2.17/phantasia/main.c:299:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((Monstfp = fopen(_PATH_MONST, "r+")) == NULL) data/bsdgames-2.17/phantasia/main.c:303:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((Messagefp = fopen(_PATH_MESS, "r")) == NULL) data/bsdgames-2.17/phantasia/main.c:307:22: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((Energyvoidfp = fopen(_PATH_VOID, "r+")) == NULL) data/bsdgames-2.17/phantasia/main.c:511:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(_PATH_MESS, "w"); data/bsdgames-2.17/phantasia/main.c:633:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hiname[21], nxtname[21]; /* used for finding the two data/bsdgames-2.17/phantasia/main.c:641:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(_PATH_MOTD, "r")) != NULL data/bsdgames-2.17/phantasia/main.c:719:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(_PATH_LASTDEAD, "r")) != NULL data/bsdgames-2.17/phantasia/map.c:134:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[2]; data/bsdgames-2.17/phantasia/map.c:151:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s1[2]; data/bsdgames-2.17/phantasia/misc.c:73:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *const nametable[4][4] = /* names of places */ data/bsdgames-2.17/phantasia/misc.c:138:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(Databuf, "%.29s", label); data/bsdgames-2.17/phantasia/misc.c:654:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(_PATH_LASTDEAD, "w"); data/bsdgames-2.17/phantasia/misc.c:661:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(_PATH_MESS, "w"); data/bsdgames-2.17/phantasia/misc.c:1063:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(_PATH_GOLD, "r+")) != NULL) data/bsdgames-2.17/phantasia/phantglobs.c:110:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Databuf[SZ_DATABUF]; /* a place to read data into */ data/bsdgames-2.17/phantasia/phantstruct.h:64:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p_name[SZ_NAME]; /* name */ data/bsdgames-2.17/phantasia/phantstruct.h:65:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p_password[SZ_PASSWORD];/* password */ data/bsdgames-2.17/phantasia/phantstruct.h:66:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char p_login[SZ_LOGIN]; /* login */ data/bsdgames-2.17/phantasia/phantstruct.h:88:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char m_name[26]; /* name */ data/bsdgames-2.17/phantasia/phantstruct.h:101:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sb_type[4]; /* character type of player */ data/bsdgames-2.17/phantasia/phantstruct.h:102:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sb_name[SZ_NAME]; /* name of player */ data/bsdgames-2.17/phantasia/phantstruct.h:103:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sb_login[SZ_LOGIN]; /* login of player */ data/bsdgames-2.17/phantasia/setup.c:113:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(path, "w")) == NULL) data/bsdgames-2.17/phantasia/setup.c:119:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((Monstfp = fopen(path, "w")) == NULL) data/bsdgames-2.17/phantasia/setup.c:123:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(monsterfile, "r")) == NULL) data/bsdgames-2.17/phantasia/setup.c:163:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(path, "w")) == NULL) data/bsdgames-2.17/pig/pig.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/bsdgames-2.17/pom/pom.c:101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/bsdgames-2.17/ppt/ppt.c:72:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *p, buf[132]; data/bsdgames-2.17/primes/primes.c:88:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char table[TABSIZE]; /* Eratosthenes sieve of odd numbers */ data/bsdgames-2.17/primes/primes.c:182:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *p, buf[LINE_MAX]; /* > max number of digits. */ data/bsdgames-2.17/primes/primes.c:277:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(table, &pattern[factor], pattern_size-factor); data/bsdgames-2.17/primes/primes.c:281:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&table[fact_lim], pattern, pattern_size); data/bsdgames-2.17/primes/primes.c:284:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&table[fact_lim], pattern, TABSIZE-fact_lim); data/bsdgames-2.17/quiz/quiz.c:131:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(file, "r")) == NULL) data/bsdgames-2.17/quiz/quiz.c:236:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *answer, *t, question[LINE_SZ]; data/bsdgames-2.17/quiz/rxp.c:83:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rxperr[128]; /* parser error message */ data/bsdgames-2.17/quiz/rxp.c:274:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[RXP_LINE_SZ/2]; data/bsdgames-2.17/robots/auto.c:146:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ans[sizeof moves]; data/bsdgames-2.17/robots/auto.c:231:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ok_moves[10], best_move; data/bsdgames-2.17/robots/extern.c:61:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Field[Y_FIELDSIZE][X_FIELDSIZE]; /* the playing field itslef */ data/bsdgames-2.17/robots/main.c:64:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). score_wfd = open(Scorefile, O_RDWR); data/bsdgames-2.17/robots/main.c:80:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). Max_per_uid = atoi(av[0]); data/bsdgames-2.17/robots/main.c:85:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). score_wfd = open(Scorefile, O_RDWR); data/bsdgames-2.17/robots/robots.h:91:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s_name[MAXNAME]; data/bsdgames-2.17/robots/robots.h:107:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char Cnt_move, Field[Y_FIELDSIZE][X_FIELDSIZE], Run_ch; data/bsdgames-2.17/robots/score.c:224:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((inf = open(Scorefile, O_RDONLY)) < 0) { data/bsdgames-2.17/sail/dr_1.c:147:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[60]; data/bsdgames-2.17/sail/dr_2.c:151:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[10]; data/bsdgames-2.17/sail/dr_2.c:233:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char st[4]; data/bsdgames-2.17/sail/dr_2.c:238:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(st, "%d", n); data/bsdgames-2.17/sail/dr_3.c:59:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char moved[NSHIP]; data/bsdgames-2.17/sail/extern.h:143:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char l_name[20]; data/bsdgames-2.17/sail/extern.h:177:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char captain[20]; /* 0 */ data/bsdgames-2.17/sail/extern.h:188:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char movebuf[10]; /* 72 */ data/bsdgames-2.17/sail/extern.h:268:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char AMMO[9][4]; data/bsdgames-2.17/sail/extern.h:269:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char HDT[9][10]; data/bsdgames-2.17/sail/extern.h:270:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char HDTrake[9][10]; data/bsdgames-2.17/sail/extern.h:271:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char QUAL[9][5]; data/bsdgames-2.17/sail/extern.h:272:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char MT[9][3]; data/bsdgames-2.17/sail/globals.c:444:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char AMMO[9][4] = { data/bsdgames-2.17/sail/globals.c:456:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char HDT[9][10] = { data/bsdgames-2.17/sail/globals.c:468:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char HDTrake[9][10] = { data/bsdgames-2.17/sail/globals.c:480:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char QUAL[9][5] = { data/bsdgames-2.17/sail/globals.c:492:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char MT[9][3] = { data/bsdgames-2.17/sail/lo_main.c:63:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sbuf[32]; data/bsdgames-2.17/sail/lo_main.c:69:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(_PATH_LOGFILE, "r")) == 0) { data/bsdgames-2.17/sail/lo_main.c:88:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sbuf, "%20.20s", log.l_name); data/bsdgames-2.17/sail/main.c:67:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("/dev/null", O_RDONLY); data/bsdgames-2.17/sail/main.c:112:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). game = atoi(*argv); data/bsdgames-2.17/sail/misc.c:207:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(_PATH_LOGFILE, "r+")) == NULL) { data/bsdgames-2.17/sail/pl_4.c:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[60]; data/bsdgames-2.17/sail/pl_4.c:92:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[3]; data/bsdgames-2.17/sail/pl_5.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prompt[60]; data/bsdgames-2.17/sail/pl_5.c:63:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[60], last = '\0'; data/bsdgames-2.17/sail/pl_5.c:73:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(prompt, "move (%d,%c%d): ", ma, af ? '\'' : ' ', ta); data/bsdgames-2.17/sail/pl_7.c:75:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char movebuf[sizeof SHIP(0)->file->movebuf]; data/bsdgames-2.17/sail/pl_7.c:175:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[BUFSIZ]; data/bsdgames-2.17/sail/pl_7.c:216:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[BUFSIZ]; data/bsdgames-2.17/sail/pl_main.c:69:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char captain[80]; data/bsdgames-2.17/sail/pl_main.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[60]; data/bsdgames-2.17/sail/pl_main.c:210:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(captain, "no name"); data/bsdgames-2.17/sail/pl_main.c:217:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[10]; data/bsdgames-2.17/sail/player.h:92:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char movebuf[sizeof SHIP(0)->file->movebuf]; data/bsdgames-2.17/sail/sync.c:62:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char sync_buf[BUFSIZE]; data/bsdgames-2.17/sail/sync.c:64:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char sync_lock[sizeof SF]; data/bsdgames-2.17/sail/sync.c:65:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char sync_file[sizeof LF]; data/bsdgames-2.17/sail/sync.c:97:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[BUFSIZ]; data/bsdgames-2.17/sail/sync.c:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[BUFSIZ]; data/bsdgames-2.17/sail/sync.c:112:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[BUFSIZ]; data/bsdgames-2.17/sail/sync.c:124:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[sizeof sync_file]; data/bsdgames-2.17/sail/sync.c:158:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). sync_fp = fopen(sync_file, "w+"); data/bsdgames-2.17/sail/sync.c:161:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). sync_fp = fopen(sync_file, "r+"); data/bsdgames-2.17/sail/sync.c:185:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sync_bp, "%d %d 0 %ld %ld %ld %ld\n", data/bsdgames-2.17/sail/sync.c:215:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/bsdgames-2.17/sail/sync.c:483:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ship->file->captain, "begin"); data/bsdgames-2.17/snake/snake/snake.c:151:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). rawscores = open(_PATH_RAWSCORES, O_RDWR|O_CREAT, 0664); data/bsdgames-2.17/snake/snake/snake.c:157:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). logfile = fopen(_PATH_LOGFILE, "a"); data/bsdgames-2.17/snake/snake/snake.c:170:9: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tv = atol(optarg); data/bsdgames-2.17/snake/snake/snake.c:174:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ccnt = atoi(optarg); data/bsdgames-2.17/snake/snake/snake.c:177:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). lcnt = atoi(optarg); data/bsdgames-2.17/snake/snscore/snscore.c:80:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = fopen(recfile, "r"); data/bsdgames-2.17/tetris/scores.c:115:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). sd = open(_PATH_SCOREFILE, mint, 0666); data/bsdgames-2.17/tetris/scores.c:221:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char u[sizeof(scores[0].hs_name)]; data/bsdgames-2.17/tetris/scores.c:236:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(u, p, l); data/bsdgames-2.17/tetris/scores.c:416:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/bsdgames-2.17/tetris/scores.h:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hs_name[20]; /* login name */ data/bsdgames-2.17/tetris/screen.c:102:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tcname[3]; data/bsdgames-2.17/tetris/screen.c:124:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char combuf[1024], tbuf[1024]; data/bsdgames-2.17/tetris/screen.c:158:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tcname[3]; data/bsdgames-2.17/tetris/tetris.c:74:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_msg[100]; data/bsdgames-2.17/tetris/tetris.c:135:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key_write[6][10]; data/bsdgames-2.17/tetris/tetris.c:143:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("/dev/null", O_RDONLY); data/bsdgames-2.17/tetris/tetris.c:157:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). level = atoi(optarg); data/bsdgames-2.17/tetris/tetris.c:189:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(key_write[i], "<space>"); data/bsdgames-2.17/tetris/tetris.h:169:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char key_msg[100]; data/bsdgames-2.17/trek/destruct.c:72:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char checkpass[15]; data/bsdgames-2.17/trek/dumpgame.c:129:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open("trek.dump", O_RDONLY)) < 0 || data/bsdgames-2.17/trek/events.c:396:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, Quad, sizeof (Quad)); data/bsdgames-2.17/trek/events.c:398:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, Event, sizeof (Event)); data/bsdgames-2.17/trek/events.c:400:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, &Now, sizeof (Now)); data/bsdgames-2.17/trek/externs.c:67:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const Systemname[NINHAB] = data/bsdgames-2.17/trek/externs.c:106:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Sect[NSECTS][NSECTS]; data/bsdgames-2.17/trek/getpar.c:128:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input[100]; data/bsdgames-2.17/trek/getpar.c:210:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format[20]; data/bsdgames-2.17/trek/help.c:66:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const Cntvect[3] = data/bsdgames-2.17/trek/main.c:220:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). prio = atoi(av[0] + 2); data/bsdgames-2.17/trek/shield.c:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[100]; data/bsdgames-2.17/trek/srscan.c:60:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *const Color[4] = data/bsdgames-2.17/trek/trek.h:83:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char *const Systemname[NINHAB]; data/bsdgames-2.17/trek/trek.h:99:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char Sect[NSECTS][NSECTS]; data/bsdgames-2.17/trek/trek.h:256:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char passwd[15]; /* game password */ data/bsdgames-2.17/trek/trek.h:297:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char moveprob[6]; /* probability that a Klingon moves */ data/bsdgames-2.17/trek/trek.h:334:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char snapshot[sizeof Quad + sizeof Event + sizeof Now]; /* snapshot for time warp */ data/bsdgames-2.17/trek/warp.c:184:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, Quad, sizeof Quad); data/bsdgames-2.17/trek/warp.c:186:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, Event, sizeof Event); data/bsdgames-2.17/trek/warp.c:188:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, &Now, sizeof Now); data/bsdgames-2.17/worm/worm.c:81:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outbuf[BUFSIZ]; data/bsdgames-2.17/worm/worm.c:127:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). start_len = atoi(argv[1]); data/bsdgames-2.17/worms/worms.c:220:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((length = atoi(optarg)) < 2 || length > 1024) { data/bsdgames-2.17/worms/worms.c:226:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((number = atoi(optarg)) < 1) { data/bsdgames-2.17/wump/wump.c:113:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char answer[20]; /* user input */ data/bsdgames-2.17/wump/wump.c:157:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). arrow_num = atoi(optarg); data/bsdgames-2.17/wump/wump.c:160:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bat_num = atoi(optarg); data/bsdgames-2.17/wump/wump.c:171:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). pit_num = atoi(optarg); data/bsdgames-2.17/wump/wump.c:174:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). room_num = atoi(optarg); data/bsdgames-2.17/wump/wump.c:187:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). link_num = atoi(optarg); data/bsdgames-2.17/wump/wump.c:330:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). next_room = atoi(room_number); data/bsdgames-2.17/wump/wump.c:351:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). next_room = atoi(answer); data/bsdgames-2.17/wump/wump.c:440:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). next = atoi(p); data/bsdgames-2.17/wump/wump.c:669:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[20]; data/bsdgames-2.17/wump/wump.c:775:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(_PATH_WUMPINFO, O_RDONLY)) == -1) data/bsdgames-2.17/adventure/extern.h:120:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define length(str) (strlen((str)) + 1) data/bsdgames-2.17/adventure/hdr.h:66:65: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define FLUSHLINE do { int flushline_ch; while ((flushline_ch = getchar()) != EOF && flushline_ch != '\n'); } while (0) data/bsdgames-2.17/adventure/io.c:68:13: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((*s = getchar()) >= 'A' && *s <= 'Z') data/bsdgames-2.17/adventure/io.c:111:13: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((ch = getchar()) == 'y') data/bsdgames-2.17/adventure/io.c:139:13: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((ch = getchar()) == 'y') data/bsdgames-2.17/adventure/setup.c:101:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getc(infile)) != EOF) { data/bsdgames-2.17/adventure/setup.c:104:16: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getc(infile)) == ' ' && c != EOF); data/bsdgames-2.17/adventure/wizard.c:138:8: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ch = getchar(); data/bsdgames-2.17/arithmetic/arithmetic.c:182:10: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while(!getchar()) ; data/bsdgames-2.17/atc/graphics.c:71:14: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getchar()) == EOF && errno == EINTR) { data/bsdgames-2.17/atc/graphics.c:309:6: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getchar(); data/bsdgames-2.17/atc/graphics.c:407:14: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getchar()) != EOF && c != ' ') data/bsdgames-2.17/atc/input.c:186:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(T_STR, ""); data/bsdgames-2.17/atc/input.c:202:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(T_STR, ""); data/bsdgames-2.17/atc/input.c:215:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). newpos = T_POS + strlen(T_STR); data/bsdgames-2.17/atc/input.c:225:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(T_STR, ""); data/bsdgames-2.17/atc/input.c:269:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ioerror(stack[i].pos, strlen(stack[i].str), s); data/bsdgames-2.17/atc/log.c:109:13: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). old_mask = umask(0); data/bsdgames-2.17/atc/log.c:111:2: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(old_mask); data/bsdgames-2.17/atc/main.c:126:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf[strlen(buf) - 1] = '\0'; data/bsdgames-2.17/atc/main.c:250:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). line[strlen(line) - 1] = '\0'; data/bsdgames-2.17/atc/main.c:273:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). line[strlen(line) - 1] = '\0'; data/bsdgames-2.17/backgammon/backgammon/move.c:457:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(tests, ""); data/bsdgames-2.17/backgammon/backgammon/move.c:499:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tests, "o"); data/bsdgames-2.17/backgammon/backgammon/move.c:504:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tests, "e"); data/bsdgames-2.17/backgammon/backgammon/move.c:509:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tests, "i"); data/bsdgames-2.17/backgammon/backgammon/move.c:516:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tests, "i"); data/bsdgames-2.17/backgammon/backgammon/move.c:524:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tests, "c"); data/bsdgames-2.17/backgammon/backgammon/move.c:529:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tests, "o"); data/bsdgames-2.17/backgammon/backgammon/move.c:534:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tests, "o"); data/bsdgames-2.17/backgammon/backgammon/move.c:539:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tests, "b"); data/bsdgames-2.17/backgammon/backgammon/move.c:544:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tests, "e"); data/bsdgames-2.17/backgammon/backgammon/move.c:549:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tests, "f"); data/bsdgames-2.17/backgammon/backgammon/move.c:554:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tests, "p"); data/bsdgames-2.17/backgammon/backgammon/move.c:559:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tests, "i"); data/bsdgames-2.17/backgammon/backgammon/move.c:564:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(tests, "f"); data/bsdgames-2.17/backgammon/common_source/fancy.c:432:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). count = strlen(m); data/bsdgames-2.17/backgammon/common_source/fancy.c:720:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lHO = strlen(HO); data/bsdgames-2.17/backgammon/common_source/fancy.c:722:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lBC = strlen(BC); data/bsdgames-2.17/backgammon/common_source/fancy.c:726:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lUP = strlen(UP); data/bsdgames-2.17/backgammon/common_source/fancy.c:728:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lND = strlen(ND); data/bsdgames-2.17/backgammon/common_source/save.c:155:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fdesc, board, sizeof board); data/bsdgames-2.17/backgammon/common_source/save.c:156:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fdesc, off, sizeof off); data/bsdgames-2.17/backgammon/common_source/save.c:157:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fdesc, in, sizeof in); data/bsdgames-2.17/backgammon/common_source/save.c:158:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fdesc, dice, sizeof dice); data/bsdgames-2.17/backgammon/common_source/save.c:159:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fdesc, &cturn, sizeof cturn); data/bsdgames-2.17/backgammon/common_source/save.c:160:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fdesc, &dlast, sizeof dlast); data/bsdgames-2.17/backgammon/common_source/save.c:161:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fdesc, &pnum, sizeof pnum); data/bsdgames-2.17/backgammon/common_source/save.c:162:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fdesc, &rscore, sizeof rscore); data/bsdgames-2.17/backgammon/common_source/save.c:163:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fdesc, &wscore, sizeof wscore); data/bsdgames-2.17/backgammon/common_source/save.c:164:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fdesc, &gvalue, sizeof gvalue); data/bsdgames-2.17/backgammon/common_source/save.c:165:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fdesc, &raflag, sizeof raflag); data/bsdgames-2.17/backgammon/common_source/subs.c:107:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(0, &c, 1) != 1) data/bsdgames-2.17/banner/banner.c:1071:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(message, " "); data/bsdgames-2.17/banner/banner.c:1074:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nchars = strlen(message); data/bsdgames-2.17/banner/banner.c:1079:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nchars = strlen(message); data/bsdgames-2.17/battlestar/cypher.c:454:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(DEFAULT_SAVE_FILE)); data/bsdgames-2.17/battlestar/fly.c:93:11: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). switch (getchar()) { data/bsdgames-2.17/battlestar/getcom.c:65:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (buf[strlen(buf) - 1] != '\n') { data/bsdgames-2.17/battlestar/getcom.c:67:15: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((i = getchar()) != '\n' && i != EOF) data/bsdgames-2.17/battlestar/init.c:72:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). savefile = save_file_name(filename, strlen(filename)); data/bsdgames-2.17/battlestar/save.c:178:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmpl = strlen(home); data/bsdgames-2.17/bcd/bcd.c:168:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen((char *)str) > COLUMNS) data/bsdgames-2.17/boggle/boggle/bog.c:184:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(argv[0]) != 16) { data/bsdgames-2.17/boggle/boggle/bog.c:358:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf) < (size_t)minlength) { data/bsdgames-2.17/boggle/boggle/bog.c:390:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf) + 1; data/bsdgames-2.17/boggle/boggle/help.c:65:13: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (ungetc(getc(fp), fp) == EOF) { data/bsdgames-2.17/boggle/boggle/help.c:80:21: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (eof || ungetc(getc(fp), fp) == EOF) { data/bsdgames-2.17/boggle/boggle/mach.c:162:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (strlen(base[indx])); data/bsdgames-2.17/boggle/boggle/mach.c:351:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((n = strlen(w)) > maxw) data/bsdgames-2.17/boggle/boggle/word.c:89:18: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((pcount = getc(fp)) == EOF) data/bsdgames-2.17/boggle/boggle/word.c:97:16: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((ch = getc(fp)) != EOF && ch >= 'a') data/bsdgames-2.17/boggle/mkdict/mkdict.c:82:17: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((ch = getc(stdin)) != EOF && ch != '\n') data/bsdgames-2.17/boggle/mkindex/mkindex.c:111:17: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((pcount = getc(fp)) == EOF) data/bsdgames-2.17/boggle/mkindex/mkindex.c:120:15: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((ch = getc(fp)) != EOF && ch >= 'a') data/bsdgames-2.17/caesar/caesar.c:109:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((nread = read(STDIN_FILENO, inbuf, LINELENGTH)) < 0) data/bsdgames-2.17/caesar/caesar.c:144:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((nread = read(STDIN_FILENO, inbuf, LINELENGTH)) < 0) data/bsdgames-2.17/caesar/caesar.c:158:15: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((ch = getchar()) != EOF) data/bsdgames-2.17/canfield/canfield/canfield.c:1376:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). col += 1 + strlen(cp); data/bsdgames-2.17/canfield/canfield/canfield.c:1697:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). i = read(dbfd, (char *)&total, sizeof(total)); data/bsdgames-2.17/canfield/cfscores/cfscores.c:133:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). i = read(dbfd, (char *)&total, sizeof(total)); data/bsdgames-2.17/cribbage/io.c:258:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(p) == 2) { /* check for short form */ data/bsdgames-2.17/cribbage/io.c:392:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Newpos = strlen(Msgbuf); data/bsdgames-2.17/cribbage/io.c:408:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Newpos = strlen(Msgbuf); data/bsdgames-2.17/cribbage/io.c:430:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(mp); data/bsdgames-2.17/cribbage/io.c:442:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((len = strlen(mp)) > MSG_X) { data/bsdgames-2.17/cribbage/io.c:515:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (read(STDIN_FILENO, &c, sizeof(char)) <= 0) data/bsdgames-2.17/cribbage/io.c:556:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(unctrl(*sp)); i; i--) data/bsdgames-2.17/dm/dm.c:137:8: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. if (sscanf(lbuf, "%39s%39s", f1, f2) != 2 || data/bsdgames-2.17/dm/dm.c:143:8: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. if (sscanf(lbuf, "%39s%39s%39s%39s%39s", data/bsdgames-2.17/dm/dm.c:149:8: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. if (sscanf(lbuf, "%39s%39s%39s%39s", f1, f2, f3, f4) != 4 || data/bsdgames-2.17/dm/dm.c:276:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((n = read(fd, buf, sizeof(buf))) > 0) data/bsdgames-2.17/dm/utmpentry.c:84:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((max = strlen(e->name)) > maxname) data/bsdgames-2.17/dm/utmpentry.c:86:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((max = strlen(e->line)) > maxline) data/bsdgames-2.17/dm/utmpentry.c:88:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((max = strlen(e->host)) > maxhost) data/bsdgames-2.17/dm/utmpentry.c:107:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(fname); data/bsdgames-2.17/dm/utmpentry.c:272:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy(e->name, up->ut_name, sizeof(up->ut_name)); data/bsdgames-2.17/dm/utmpentry.c:274:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy(e->line, up->ut_line, sizeof(up->ut_line)); data/bsdgames-2.17/dm/utmpentry.c:276:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy(e->host, up->ut_host, sizeof(up->ut_host)); data/bsdgames-2.17/dm/utmpentry.c:288:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy(e->name, up->ut_name, sizeof(up->ut_name)); data/bsdgames-2.17/dm/utmpentry.c:290:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy(e->line, up->ut_line, sizeof(up->ut_line)); data/bsdgames-2.17/dm/utmpentry.c:292:8: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void)strncpy(e->host, up->ut_host, sizeof(up->ut_host)); data/bsdgames-2.17/fish/fish.c:176:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf[strlen(buf) - 1] = '\0'; data/bsdgames-2.17/fish/fish.c:458:10: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). input = getchar(); data/bsdgames-2.17/fish/fish.c:459:9: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (getchar() != '\n'); data/bsdgames-2.17/fish/fish.c:486:18: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((input = getchar()) != EOF && input != '\n'); data/bsdgames-2.17/fortune/fortune/fortune.c:214:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define NAMLEN(d) (strlen((d)->d_name)) data/bsdgames-2.17/fortune/fortune/fortune.c:287:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(line); data/bsdgames-2.17/fortune/fortune/fortune.c:331:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nchar += strlen(line); data/bsdgames-2.17/fortune/fortune/fortune.c:525:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tpath = do_malloc((unsigned int) (strlen(dir) + strlen(file) + 2)); data/bsdgames-2.17/fortune/fortune/fortune.c:525:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tpath = do_malloc((unsigned int) (strlen(dir) + strlen(file) + 2)); data/bsdgames-2.17/fortune/fortune/fortune.c:526:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. (void) strcat(strcat(strcpy(tpath, dir), "/"), file); data/bsdgames-2.17/fortune/fortune/fortune.c:664:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). new = copy(file, (unsigned int) (strlen(file) + 2)); data/bsdgames-2.17/fortune/fortune/fortune.c:678:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(file); data/bsdgames-2.17/fortune/fortune/fortune.c:823:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(file); data/bsdgames-2.17/fortune/fortune/fortune.c:845:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). datfile = copy(file, (unsigned int) (strlen(file) + 4)); /* +4 for ".dat" */ data/bsdgames-2.17/fortune/fortune/fortune.c:858:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *posp = copy(file, (unsigned int) (strlen(file) + 4)); /* +4 for ".dat" */ data/bsdgames-2.17/fortune/fortune/fortune.c:1033:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fp->datfd, Seekpts, sizeof Seekpts); data/bsdgames-2.17/fortune/fortune/fortune.c:1144:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fd, &fp->pos, sizeof fp->pos) != sizeof fp->pos) data/bsdgames-2.17/fortune/fortune/fortune.c:1176:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, (char *) &fp->tbl, sizeof fp->tbl) != sizeof fp->tbl) { data/bsdgames-2.17/fortune/fortune/fortune.c:1373:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sp += strlen(sp); data/bsdgames-2.17/fortune/strfile/strfile.c:215:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = pos - last_off - (sp ? strlen(sp) : 0); data/bsdgames-2.17/fortune/strfile/strfile.c:436:23: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (!isalnum(c1 = getc(Sort_1)) && c1 != '\0') data/bsdgames-2.17/fortune/strfile/strfile.c:438:23: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (!isalnum(c2 = getc(Sort_2)) && c2 != '\0') data/bsdgames-2.17/fortune/strfile/strfile.c:452:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c1 = getc(Sort_1); data/bsdgames-2.17/fortune/strfile/strfile.c:453:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c2 = getc(Sort_2); data/bsdgames-2.17/gomoku/bdisp.c:127:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = 6 - strlen(plyr[BLACK]) / 2; data/bsdgames-2.17/gomoku/bdisp.c:130:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = 30 - strlen(plyr[WHITE]) / 2; data/bsdgames-2.17/gomoku/bdisp.c:234:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(str); data/bsdgames-2.17/gomoku/bdisp.c:254:26: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (cp < end && (c = getchar()) != EOF && c != '\n' && c != '\r') { data/bsdgames-2.17/gomoku/main.c:345:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getc(fp)) != EOF && c != '\n') data/bsdgames-2.17/gomoku/main.c:442:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str += strlen(str); data/bsdgames-2.17/gomoku/pickmove.c:1244:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str += strlen(str); data/bsdgames-2.17/gomoku/pickmove.c:1302:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str += strlen(str); data/bsdgames-2.17/gomoku/pickmove.c:1312:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str += strlen(str); data/bsdgames-2.17/gomoku/pickmove.c:1345:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str += strlen(str); data/bsdgames-2.17/gomoku/pickmove.c:1349:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str += strlen(str); data/bsdgames-2.17/hack/hack.do_name.c:148:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lth = strlen(buf) + 1; data/bsdgames-2.17/hack/hack.do_name.c:180:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lth = strlen(buf) + 1; data/bsdgames-2.17/hack/hack.do_name.c:254:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str = newstring(strlen(buf) + 1); data/bsdgames-2.17/hack/hack.end.c:359:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(t0->name, plname, NAMSZ); data/bsdgames-2.17/hack/hack.end.c:361:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(t0->death, killer, DTHSZ); data/bsdgames-2.17/hack/hack.end.c:373:7: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. if (fscanf(rfile, "%6s %d %d %d %d %d %ld %c%c %[^,],%[^\n]", data/bsdgames-2.17/hack/hack.end.c:552:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hppos = COLNO - 7 - strlen(hpbuf); data/bsdgames-2.17/hack/hack.end.c:574:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (strlen(linebuf)); data/bsdgames-2.17/hack/hack.end.c:702:7: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. if (fscanf(rfile, "%6s %d %d %d %d %d %ld %c%c %[^,],%[^\n]", data/bsdgames-2.17/hack/hack.engrave.c:113:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(s); data/bsdgames-2.17/hack/hack.engrave.c:142:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lth = strlen(ep->engr_txt); data/bsdgames-2.17/hack/hack.engrave.c:193:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). alloc((unsigned) (sizeof(struct engr) + strlen(s) + 1)); data/bsdgames-2.17/hack/hack.engrave.c:202:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ep->engr_lth = strlen(s) + 1; data/bsdgames-2.17/hack/hack.engrave.c:289:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(sp); data/bsdgames-2.17/hack/hack.engrave.c:322:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(oep->engr_txt) + spct; data/bsdgames-2.17/hack/hack.lev.c:329:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rlen = read(fd, buf, (int) len); data/bsdgames-2.17/hack/hack.main.c:159:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(plname, s, sizeof(plname) - 1); data/bsdgames-2.17/hack/hack.main.c:161:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(plname, s, sizeof(plname) - 1); data/bsdgames-2.17/hack/hack.main.c:163:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(plname, s, sizeof(plname) - 1); data/bsdgames-2.17/hack/hack.main.c:226:12: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(plname, argv[0] + 2, sizeof(plname) - 1); data/bsdgames-2.17/hack/hack.main.c:230:12: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(plname, argv[0], sizeof(plname) - 1); data/bsdgames-2.17/hack/hack.main.c:236:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(pl_character, argv[0] + 1, data/bsdgames-2.17/hack/hack.main.c:504:14: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getchar()) != '\n') { data/bsdgames-2.17/hack/hack.makemon.c:96:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ct = CMNUM - strlen(fut_geno); data/bsdgames-2.17/hack/hack.o_init.c:191:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(objects[i].oc_uname) + 1; data/bsdgames-2.17/hack/hack.o_init.c:196:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(objects[i].oc_name) + 1; data/bsdgames-2.17/hack/hack.o_init.c:201:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(objects[i].oc_descr) + 1; data/bsdgames-2.17/hack/hack.objnam.c:81:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int i = strlen(pref); data/bsdgames-2.17/hack/hack.objnam.c:87:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(s, pref, i); /* do not copy trailing 0 */ data/bsdgames-2.17/hack/hack.objnam.c:554:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int j = strlen(wrp[i]); data/bsdgames-2.17/hack/hack.options.c:170:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(plname, op + 1, sizeof(plname) - 1); data/bsdgames-2.17/hack/hack.pager.c:105:14: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void) strncpy(buf + 1, " ", 7); data/bsdgames-2.17/hack/hack.pager.c:284:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(text); data/bsdgames-2.17/hack/hack.pri.c:761:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(newbot) >= COLNO) { data/bsdgames-2.17/hack/hack.read.c:264:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } while (strlen(buf) != 1 || !monstersym(*buf)); data/bsdgames-2.17/hack/hack.rip.c:107:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((i1 = strlen(buf)) > 16) { data/bsdgames-2.17/hack/hack.rip.c:132:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int n = strlen(text) / 2; data/bsdgames-2.17/hack/hack.save.c:197:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, (char *) &tmp, sizeof tmp) != sizeof tmp) data/bsdgames-2.17/hack/hack.shk.c:333:12: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(ESHK(shopkeeper)->customer, plname, PL_NSIZ); data/bsdgames-2.17/hack/hack.shknam.c:228:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(nampt, q[i], PL_NSIZ); data/bsdgames-2.17/hack/hack.termcap.c:334:2: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(50000); data/bsdgames-2.17/hack/hack.topl.c:124:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). alloc((unsigned) (strlen(toplines) + sizeof(struct topl) + 1)); data/bsdgames-2.17/hack/hack.topl.c:144:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (tlx + (int)strlen(s) > CO) data/bsdgames-2.17/hack/hack.topl.c:233:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n0 = strlen(bp); data/bsdgames-2.17/hack/hack.topl.c:235:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n0 + (int)strlen(toplines) + 3 < CO - 8 && /* leave room for data/bsdgames-2.17/hack/hack.topl.c:262:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy((tl = eos(toplines)), bp, n0); data/bsdgames-2.17/hack/hack.topl.c:270:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n0 = strlen(bp); data/bsdgames-2.17/hack/hack.topl.c:272:11: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. (void) strcat(tl, "\n"); data/bsdgames-2.17/hack/hack.tty.c:231:12: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c = getchar()) == EOF) { data/bsdgames-2.17/hack/hack.tty.c:334:18: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inputline[1] = getchar(); data/bsdgames-2.17/hack/hack.tty.c:337:19: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inputline[2] = getchar(); data/bsdgames-2.17/hack/hack.tty.c:343:18: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inputline[1] = getchar(); data/bsdgames-2.17/hack/hack.tty.c:356:13: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((sym = getchar()) == EOF) data/bsdgames-2.17/hack/hack.tty.c:367:15: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((sym = getchar()) != EOF) data/bsdgames-2.17/hack/hack.u_init.c:246:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(pl_character, roles[i], PL_CSIZ - 1); data/bsdgames-2.17/hack/hack.unix.c:194:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). np = path + strlen(path); /* point to end str */ data/bsdgames-2.17/hack/hack.unix.c:198:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(filename, path, np - path); data/bsdgames-2.17/hack/hack.unix.c:244:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, (char *) &lockedpid, sizeof(lockedpid)) != data/bsdgames-2.17/hack/makedefs.c:149:22: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int n = read(fd, lp0, (line + LINSZ) - lp0); data/bsdgames-2.17/hack/makedefs.c:181:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((int)strlen(s) > lpe - lp + 1) { data/bsdgames-2.17/hack/makedefs.c:191:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((int)strlen(s) > lpe - lp + 1) { data/bsdgames-2.17/hack/makedefs.c:238:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(string, identif, 3), data/bsdgames-2.17/hangman/getguess.c:101:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(0, &ch, sizeof ch) <= 0) { data/bsdgames-2.17/hangman/getword.c:64:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Word[strlen(Word) - 1] = '\0'; data/bsdgames-2.17/hangman/getword.c:65:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(Word) < Minlen) data/bsdgames-2.17/hunt/hunt/hunt.c:148:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(name, optarg, NAMELEN); data/bsdgames-2.17/hunt/hunt/hunt.c:260:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. (void) strncpy(name, "otto", NAMELEN); data/bsdgames-2.17/hunt/hunt/hunt.c:642:23: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (!islower(c = getchar()) || (c -= 'a') >= i) { data/bsdgames-2.17/hunt/hunt/hunt.c:677:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((cnt = read(s, buf, BUFSIZ)) > 0) data/bsdgames-2.17/hunt/hunt/hunt.c:847:8: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ch = getchar(); data/bsdgames-2.17/hunt/hunt/hunt.c:1029:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name, envname, NAMELEN); data/bsdgames-2.17/hunt/hunt/hunt.c:1033:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name, envname, NAMELEN); data/bsdgames-2.17/hunt/hunt/hunt.c:1098:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name, envp, NAMELEN); data/bsdgames-2.17/hunt/hunt/hunt.c:1138:7: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). i = getchar(); data/bsdgames-2.17/hunt/hunt/hunt.c:1142:8: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). i = getchar(); data/bsdgames-2.17/hunt/hunt/playit.c:113:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(Socket, (char *) &version, LONGLEN) != LONGLEN) { data/bsdgames-2.17/hunt/hunt/playit.c:265:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). icnt = read(Socket, ibuf, sizeof ibuf); data/bsdgames-2.17/hunt/hunt/playit.c:288:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). count = read(STDIN, Buf, sizeof Buf); data/bsdgames-2.17/hunt/hunt/playit.c:348:20: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (isupper(ch = getchar())) data/bsdgames-2.17/hunt/hunt/playit.c:369:22: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (isupper(ch = getchar())) data/bsdgames-2.17/hunt/hunt/playit.c:398:15: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((ch = getchar()) == '\n' || ch == '\r') data/bsdgames-2.17/hunt/hunt/playit.c:476:20: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (isupper(ch = getchar())) data/bsdgames-2.17/hunt/hunt/playit.c:648:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(Socket, (char *) &version, LONGLEN) != LONGLEN) { data/bsdgames-2.17/hunt/hunt/playit.c:657:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (write(Socket, Send_message, strlen(Send_message)) < 0) { data/bsdgames-2.17/hunt/huntd/answer.c:95:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (void) read(newsock, (char *) &uid, LONGLEN); data/bsdgames-2.17/hunt/huntd/answer.c:97:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (void) read(newsock, name, NAMELEN); data/bsdgames-2.17/hunt/huntd/answer.c:98:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (void) read(newsock, &team, 1); data/bsdgames-2.17/hunt/huntd/answer.c:99:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (void) read(newsock, (char *) &enter_status, LONGLEN); data/bsdgames-2.17/hunt/huntd/answer.c:101:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (void) read(newsock, Ttyname, NAMELEN); data/bsdgames-2.17/hunt/huntd/answer.c:102:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (void) read(newsock, (char *) &mode, sizeof mode); data/bsdgames-2.17/hunt/huntd/answer.c:132:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). n = strlen(buf); data/bsdgames-2.17/hunt/huntd/answer.c:137:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((n = read(newsock, buf, BUFSIZ)) > 0) data/bsdgames-2.17/hunt/huntd/answer.c:411:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ip->i_name, name, NAMELEN); data/bsdgames-2.17/hunt/huntd/draw.c:359:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). outstr(pp, s, strlen(s)); data/bsdgames-2.17/hunt/huntd/driver.c:107:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Last_arg = ep[-1] + strlen(ep[-1]); data/bsdgames-2.17/hunt/huntd/driver.c:286:9: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). (void) umask(0); /* No privacy at all! */ data/bsdgames-2.17/hunt/huntd/driver.c:628:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(pp->p_death); /* Display the cause of death */ data/bsdgames-2.17/hunt/huntd/driver.c:855:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((pp->p_nchar = read(pp->p_fd, pp->p_cbuf, sizeof pp->p_cbuf)) <= 0) data/bsdgames-2.17/hunt/huntd/driver.c:946:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(ip->i_name) < 8) data/bsdgames-2.17/hunt/huntd/driver.c:957:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(ip->i_name) < 8) data/bsdgames-2.17/hunt/huntd/driver.c:962:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(ip->i_name) + 3 < 8) data/bsdgames-2.17/hunt/huntd/faketalk.c:169:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (void) write(service, buf, strlen(buf)); data/bsdgames-2.17/hunt/huntd/faketalk.c:172:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (void) write(service, buf, strlen(buf)); data/bsdgames-2.17/hunt/huntd/faketalk.c:179:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = buf + 4, t = buf + strlen(buf) - 1; data/bsdgames-2.17/hunt/huntd/faketalk.c:183:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t = s + strlen(s) - 1; data/bsdgames-2.17/hunt/huntd/get_names.c:70:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(msg.l_name, my_name, NAME_SIZE); data/bsdgames-2.17/hunt/huntd/get_names.c:149:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). (void) strncpy(msg.r_name, his_name, NAME_SIZE); data/bsdgames-2.17/lib/fgetln.c:63:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *len = strlen(buf); data/bsdgames-2.17/mille/misc.c:256:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). for (cnt = 0; read(0, &c, 1) <= 0; cnt++) data/bsdgames-2.17/mille/move.c:549:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). move(MOVE_Y, MOVE_X + strlen(names[promptno]) + 1); data/bsdgames-2.17/mille/varpush.c:83:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((read(file, (void *) &temp, sizeof temp)) < 0) { data/bsdgames-2.17/monop/cards.c:139:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). type_maj = getc(deckf); data/bsdgames-2.17/monop/cards.c:141:13: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). type_min = getc(deckf); data/bsdgames-2.17/monop/cards.c:237:14: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getc(deckf)) != '\0') data/bsdgames-2.17/monop/execute.c:187:16: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((*sp++=getchar()) != '\n') data/bsdgames-2.17/monop/execute.c:229:22: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). for (sp = buf; (*sp=getchar()) != '\n'; sp++) data/bsdgames-2.17/monop/execute.c:262:3: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(inf, start, num); data/bsdgames-2.17/monop/getinp.c:63:21: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). for (sp = buf; (c=getchar()) != '\n'; ) { data/bsdgames-2.17/monop/getinp.c:74:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((match+=(n_match=strlen(list[i]))) > LINE) { data/bsdgames-2.17/monop/initdeck.c:201:12: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c=getc(inf)) != EOF) data/bsdgames-2.17/monop/initdeck.c:205:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (getc(inf) == '-') data/bsdgames-2.17/monop/initdeck.c:228:7: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). putc(getc(inf), outf); data/bsdgames-2.17/monop/initdeck.c:229:7: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). putc(getc(inf), outf); data/bsdgames-2.17/monop/initdeck.c:230:19: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). for (num = 0; (c=getc(inf)) != '\n'; ) data/bsdgames-2.17/monop/initdeck.c:234:12: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c=getc(inf)) != EOF) data/bsdgames-2.17/monop/initdeck.c:238:8: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (getc(inf) == '-') data/bsdgames-2.17/monop/initdeck.c:240:11: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (getc(inf) != '\n') data/bsdgames-2.17/monop/initdeck.c:243:11: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((c=getc(inf)) == EOF) data/bsdgames-2.17/monop/initdeck.c:246:13: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). putc(c = getc(inf), outf); data/bsdgames-2.17/monop/initdeck.c:247:21: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). for (num = 0; (c=getc(inf)) != EOF && c != '\n'; ) data/bsdgames-2.17/monop/malloc.c:147:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). iov[1].iov_len = strlen(s); data/bsdgames-2.17/monop/misc.c:106:21: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). for (sp = buf; (c=getchar()) != '\n'; *sp++ = c) data/bsdgames-2.17/monop/monop.c:125:23: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). for (sp = buf; (*sp=getchar()) != '\n'; sp++) data/bsdgames-2.17/morse/morse.c:159:17: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((ch = getchar()) != EOF) { data/bsdgames-2.17/morse/morse.c:167:20: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((ch = getchar()) != EOF && data/bsdgames-2.17/morse/morse.c:195:21: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). else while ((ch = getchar()) != EOF) data/bsdgames-2.17/number/number.c:167:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((len = strlen(line)) > MAXNUM || data/bsdgames-2.17/number/number.c:168:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (fraction != NULL && (flen = strlen(fraction)) > MAXNUM)) data/bsdgames-2.17/phantasia/io.c:33:8: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ch = getchar(); /* get character */ data/bsdgames-2.17/phantasia/io.c:196:9: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ch = getchar(); data/bsdgames-2.17/phantasia/main.c:643:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mvaddstr(2, 40 - strlen(Databuf) / 2, Databuf); data/bsdgames-2.17/phantasia/main.c:655:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mvaddstr(4, 40 - strlen(Databuf) / 2, Databuf); data/bsdgames-2.17/phantasia/main.c:669:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mvaddstr(6, 40 - strlen(Databuf) / 2, Databuf); data/bsdgames-2.17/phantasia/main.c:685:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mvaddstr(Lines++, 40 - strlen(Databuf) / 2, Databuf); data/bsdgames-2.17/phantasia/main.c:716:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mvaddstr(17, 40 - strlen(Databuf) / 2, Databuf); data/bsdgames-2.17/phantasia/main.c:722:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mvaddstr(20, 40 - strlen(Databuf) / 2, Databuf); data/bsdgames-2.17/phantasia/misc.c:710:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(string); data/bsdgames-2.17/phantasia/setup.c:87:5: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(0117); /* only owner can read/write created files */ data/bsdgames-2.17/phantasia/setup.c:167:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fwrite(Databuf, sizeof(char), strlen(Databuf), fp); data/bsdgames-2.17/pig/pig.c:80:22: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). for (len = 0; (ch = getchar()) != EOF;) { data/bsdgames-2.17/pom/pom.c:238:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). switch (strlen(p)) { data/bsdgames-2.17/ppt/ppt.c:126:20: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). else while ((c = getchar()) != EOF) data/bsdgames-2.17/quiz/quiz.c:144:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (qp->q_text && qp->q_text[strlen(qp->q_text) - 1] == '\\') data/bsdgames-2.17/quiz/quiz.c:152:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(qp->q_text, lp, len); data/bsdgames-2.17/quiz/quiz.c:346:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((m = malloc(strlen(s) + len + 1)) == NULL) data/bsdgames-2.17/rain/rain.c:148:4: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(delay); data/bsdgames-2.17/random/random.c:135:15: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((ch = getchar()) != EOF) { data/bsdgames-2.17/robots/move.c:96:6: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(10000); data/bsdgames-2.17/robots/move.c:100:9: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getchar(); data/bsdgames-2.17/robots/move.c:103:24: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (isdigit(c = getchar())) data/bsdgames-2.17/robots/query.c:59:17: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). retval = ((c = getchar()) == 'y' || c == 'Y'); data/bsdgames-2.17/robots/score.c:65:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(inf, &max_uid, sizeof max_uid) == sizeof max_uid) { data/bsdgames-2.17/robots/score.c:68:3: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(inf, Top, sizeof Top); data/bsdgames-2.17/robots/score.c:200:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(scp->s_name, pp->pw_name, MAXNAME); data/bsdgames-2.17/sail/dr_2.c:172:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(movement, "d"); data/bsdgames-2.17/sail/dr_2.c:249:71: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((ma > 0 && ta > 0 && (n = str_end(temp)) != 'l' && n != 'r') || !strlen(temp)) { data/bsdgames-2.17/sail/dr_2.c:250:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(temp, "r"); data/bsdgames-2.17/sail/dr_2.c:259:71: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((ma > 0 && ta > 0 && (n = str_end(temp)) != 'l' && n != 'r') || !strlen(temp)){ data/bsdgames-2.17/sail/dr_2.c:260:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(temp, "l"); data/bsdgames-2.17/sail/dr_3.c:93:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(sp->file->movebuf, "d"); data/bsdgames-2.17/sail/dr_3.c:96:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(sp->file->movebuf, "d"); data/bsdgames-2.17/sail/pl_5.c:150:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(movebuf, "d"); data/bsdgames-2.17/sail/pl_7.c:465:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wmove(view_w, 4, (VIEW_X - strlen(cc->name)) / 2); data/bsdgames-2.17/sail/pl_main.c:89:10: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (getchar() != '\n') data/bsdgames-2.17/sail/pl_main.c:159:12: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (getchar() != '\n') data/bsdgames-2.17/sail/pl_main.c:164:12: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (getchar() != '\n') data/bsdgames-2.17/sail/pl_main.c:204:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(captain, nameptr, sizeof captain); data/bsdgames-2.17/sail/pl_main.c:212:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). captain[strlen(captain) - 1] = '\0'; data/bsdgames-2.17/sail/pl_main.c:222:3: [1] (buffer) scanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. scanf("%9s", buf); data/bsdgames-2.17/sail/sync.c:157:18: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). mode_t omask = umask(002); data/bsdgames-2.17/sail/sync.c:159:3: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(omask); data/bsdgames-2.17/sail/sync.c:257:20: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). switch (*p++ = getc(sync_fp)) { data/bsdgames-2.17/snake/snake/snake.c:101:18: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. #define delay(t) usleep(t * 50000); data/bsdgames-2.17/snake/snake/snake.c:540:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(rawscores, &allbscore, sizeof(short)); data/bsdgames-2.17/snake/snake/snake.c:541:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(rawscores, &allbwho, sizeof(short)); data/bsdgames-2.17/snake/snake/snake.c:543:2: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(rawscores, &oldbest, sizeof(short)); data/bsdgames-2.17/tetris/input.c:129:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (rwait(&tv) && read(0, &c, 1) != 1) data/bsdgames-2.17/tetris/input.c:158:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(0, &c, 1) != 1) data/bsdgames-2.17/tetris/scores.c:114:9: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). mask = umask(S_IWOTH); data/bsdgames-2.17/tetris/scores.c:116:8: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). (void)umask(mask); data/bsdgames-2.17/tetris/scores.c:233:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(p); data/bsdgames-2.17/tetris/scores.c:399:16: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((c = getchar()) != '\n') data/bsdgames-2.17/tetris/scores.c:463:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = 40 - strlen(buf); --i >= 0;) data/bsdgames-2.17/tetris/screen.c:494:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int l = strlen(s); data/bsdgames-2.17/tetris/tetris.c:153:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(keys = optarg) != 6) data/bsdgames-2.17/tetris/tetris.c:314:14: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((i = getchar()) != '\n') data/bsdgames-2.17/trek/cgetc.c:47:11: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return ( getchar() ); data/bsdgames-2.17/trek/dumpgame.c:130:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(fd, &version, sizeof version) != sizeof version || data/bsdgames-2.17/trek/dumpgame.c:166:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, &junk, sizeof junk) != (sizeof junk)) data/bsdgames-2.17/trek/dumpgame.c:171:7: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, d->area, i) != i) data/bsdgames-2.17/trek/dumpgame.c:176:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return (read(fd, &junk, 1)); data/bsdgames-2.17/trek/out.c:57:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (d->name[strlen(d->name) - 1] == 's') data/bsdgames-2.17/worms/worms.c:299:5: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(delay % 1000000); ANALYSIS SUMMARY: Hits = 1352 Lines analyzed = 112880 in approximately 3.63 seconds (31130 lines/second) Physical Source Lines of Code (SLOC) = 81055 Hits@level = [0] 1208 [1] 340 [2] 619 [3] 175 [4] 216 [5] 2 Hits@level+ = [0+] 2560 [1+] 1352 [2+] 1012 [3+] 393 [4+] 218 [5+] 2 Hits/KSLOC@level+ = [0+] 31.5835 [1+] 16.68 [2+] 12.4853 [3+] 4.84856 [4+] 2.68953 [5+] 0.0246746 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.