Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy_error.c Examining data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy_constants.h Examining data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy.c Examining data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy_handle_attrs.c Examining data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy_handle.c Examining data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy.h Examining data/globus-gsi-proxy-core-9.4/library/globus_i_gsi_proxy.h Examining data/globus-gsi-proxy-core-9.4/test/proxy-handle-compat-test.c Examining data/globus-gsi-proxy-core-9.4/test/proxy-handle-test.c Examining data/globus-gsi-proxy-core-9.4/test/handle-attrs-test.c Examining data/globus-gsi-proxy-core-9.4/test/proxy-core-test.c FINAL RESULTS: data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy.c:104:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). globus_i_gsi_proxy_debug_level = atoi(tmpstring); data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy.c:118:44: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). globus_i_gsi_proxy_debug_fstream = fopen(tmpstring, "a"); data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy.c:492:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char language[80]; data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy.c:542:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy.c:1274:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char md[SHA_DIGEST_LENGTH]; data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy.c:1306:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(common_name, "%ld", sub_hash); data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy.c:1386:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char language[80]; data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy.c:1436:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy_error.c:27:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char * data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy_handle.c:821:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*policy_data, data/globus-gsi-proxy-core-9.4/test/proxy-handle-compat-test.c:56:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ader[alen]; \ data/globus-gsi-proxy-core-9.4/test/proxy-handle-compat-test.c:57:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char bder[blen]; \ data/globus-gsi-proxy-core-9.4/test/proxy-handle-test.c:55:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char ader[alen]; \ data/globus-gsi-proxy-core-9.4/test/proxy-handle-test.c:56:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char bder[blen]; \ data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy.c:1291:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). GLOBUS_GSI_PROXY_MALLOC_ERROR(strlen(handle->common_name)); data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy_handle.c:2003:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(handle->common_name)); data/globus-gsi-proxy-core-9.4/library/globus_gsi_proxy_handle.c:2063:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(common_name)); data/globus-gsi-proxy-core-9.4/test/proxy-handle-test.c:893:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASN1_STRING_set(dns_name_string, example_name, strlen(example_name)); data/globus-gsi-proxy-core-9.4/test/proxy-handle-test.c:986:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASN1_STRING_set(dns_name_string, example_name, strlen(example_name)); ANALYSIS SUMMARY: Hits = 19 Lines analyzed = 9850 in approximately 0.18 seconds (53763 lines/second) Physical Source Lines of Code (SLOC) = 7349 Hits@level = [0] 12 [1] 5 [2] 14 [3] 0 [4] 0 [5] 0 Hits@level+ = [0+] 31 [1+] 19 [2+] 14 [3+] 0 [4+] 0 [5+] 0 Hits/KSLOC@level+ = [0+] 4.21826 [1+] 2.58539 [2+] 1.90502 [3+] 0 [4+] 0 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.