Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/libauthen-smb-perl-0.91/smbval/std-defines.h
Examining data/libauthen-smb-perl-0.91/smbval/rfcnb-util.h
Examining data/libauthen-smb-perl-0.91/smbval/smblib.h
Examining data/libauthen-smb-perl-0.91/smbval/smbdes.c
Examining data/libauthen-smb-perl-0.91/smbval/rfcnb-priv.h
Examining data/libauthen-smb-perl-0.91/smbval/session.c
Examining data/libauthen-smb-perl-0.91/smbval/md4.c
Examining data/libauthen-smb-perl-0.91/smbval/rfcnb-common.h
Examining data/libauthen-smb-perl-0.91/smbval/smbencrypt.c
Examining data/libauthen-smb-perl-0.91/smbval/rfcnb-error.h
Examining data/libauthen-smb-perl-0.91/smbval/smblib-priv.h
Examining data/libauthen-smb-perl-0.91/smbval/valid.c
Examining data/libauthen-smb-perl-0.91/smbval/rfcnb.h
Examining data/libauthen-smb-perl-0.91/smbval/rfcnb-io.c
Examining data/libauthen-smb-perl-0.91/smbval/std-includes.h
Examining data/libauthen-smb-perl-0.91/smbval/smblib-common.h
Examining data/libauthen-smb-perl-0.91/smbval/valid.h
Examining data/libauthen-smb-perl-0.91/smbval/byteorder.h
Examining data/libauthen-smb-perl-0.91/smbval/rfcnb-io.h
Examining data/libauthen-smb-perl-0.91/smbval/rfcnb-util.c
Examining data/libauthen-smb-perl-0.91/smbval/smblib.c
Examining data/libauthen-smb-perl-0.91/smbval/smblib-util.c

FINAL RESULTS:

data/libauthen-smb-perl-0.91/smbval/session.c:325:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buffer, "%s", RFCNB_Error_Strings[RFCNB_errno]);
data/libauthen-smb-perl-0.91/smbval/session.c:328:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buffer, "%s\n\terrno:%s", RFCNB_Error_Strings[RFCNB_errno],
data/libauthen-smb-perl-0.91/smbval/smblib-priv.h:610:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  UWORD access;
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:87:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(SMB_Attrib_Temp, (verbose?"Read Only ":"R"));
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:90:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(SMB_Attrib_Temp, (verbose?"Hidden ":"H"));
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:93:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(SMB_Attrib_Temp, (verbose?"System ":"S"));
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:96:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(SMB_Attrib_Temp, (verbose?"Volume ":"V"));
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:99:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(SMB_Attrib_Temp, (verbose?"Directory ":"D"));
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:102:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(SMB_Attrib_Temp, (verbose?"Archive ":"A"));
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:266:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p + 1, Prots[i]);
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:523:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(p + 1, path);
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:526:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(p + 1, password);
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:529:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(p + 1, device);
data/libauthen-smb-perl-0.91/smbval/smblib.c:139:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(con -> desthost, server);
data/libauthen-smb-perl-0.91/smbval/smblib.c:140:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(con -> PDomain, NTdomain);
data/libauthen-smb-perl-0.91/smbval/smblib.c:141:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(con -> OSName, SMBLIB_DEFAULT_OSNAME);
data/libauthen-smb-perl-0.91/smbval/smblib.c:142:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(con -> LMType, SMBLIB_DEFAULT_LMTYPE);
data/libauthen-smb-perl-0.91/smbval/smblib.c:231:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(con -> service, service);
data/libauthen-smb-perl-0.91/smbval/smblib.c:232:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(con -> username, username);
data/libauthen-smb-perl-0.91/smbval/smblib.c:233:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(con -> password, password);
data/libauthen-smb-perl-0.91/smbval/smblib.c:236:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(con -> PDomain, SMBLIB_DEFAULT_DOMAIN);
data/libauthen-smb-perl-0.91/smbval/smblib.c:237:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(con -> OSName, SMBLIB_DEFAULT_OSNAME);
data/libauthen-smb-perl-0.91/smbval/smblib.c:238:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(con -> LMType, SMBLIB_DEFAULT_LMTYPE);
data/libauthen-smb-perl-0.91/smbval/smblib.c:254:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(temp, service);
data/libauthen-smb-perl-0.91/smbval/smblib.c:256:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(con -> desthost, host);
data/libauthen-smb-perl-0.91/smbval/smblib.c:338:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(pword, PassWord);
data/libauthen-smb-perl-0.91/smbval/smblib.c:397:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p, UserName);
data/libauthen-smb-perl-0.91/smbval/smblib.c:403:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p, Con_Handle -> PDomain);
data/libauthen-smb-perl-0.91/smbval/smblib.c:408:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p, Con_Handle -> OSName);
data/libauthen-smb-perl-0.91/smbval/smblib.c:464:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p, UserName);
data/libauthen-smb-perl-0.91/smbval/smblib.c:470:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p, Con_Handle -> PDomain);
data/libauthen-smb-perl-0.91/smbval/smblib.c:475:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p, Con_Handle -> OSName);
data/libauthen-smb-perl-0.91/smbval/smblib.c:480:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p, Con_Handle -> LMType);
data/libauthen-smb-perl-0.91/smbval/byteorder.h:39:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define CVAL(buf,pos) (((unsigned char *)(buf))[pos])
data/libauthen-smb-perl-0.91/smbval/md4.c:126:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[128];
data/libauthen-smb-perl-0.91/smbval/md4.c:145:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, in, n);
data/libauthen-smb-perl-0.91/smbval/rfcnb-io.c:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char temp[100];   /* Read into here */
data/libauthen-smb-perl-0.91/smbval/rfcnb-io.c:228:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hdr[RFCNB_Pkt_Hdr_Len];      /* Local space for the header */
data/libauthen-smb-perl-0.91/smbval/rfcnb-io.c:303:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pkt -> data, hdr, read_len);  /*Copy data */
data/libauthen-smb-perl-0.91/smbval/rfcnb-io.c:323:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pkt -> data, hdr, sizeof(hdr));
data/libauthen-smb-perl-0.91/smbval/rfcnb-priv.h:76:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char RFCNB_Hdr[4]; /* The header is 4 bytes long with  */
data/libauthen-smb-perl-0.91/smbval/rfcnb-util.c:125:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char c1, c2, outbuf1[33];
data/libauthen-smb-perl-0.91/smbval/rfcnb-util.c:129:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char Hex_List[17] = "0123456789ABCDEF";
data/libauthen-smb-perl-0.91/smbval/rfcnb-util.c:233:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ char lname[17];
data/libauthen-smb-perl-0.91/smbval/rfcnb-util.c:338:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy((void *)Dest_IP, (void *)hp -> h_addr_list[0], sizeof(struct in_addr));
data/libauthen-smb-perl-0.91/smbval/rfcnb-util.c:344:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void *)Dest_IP, (void *)&addr, sizeof(struct in_addr));
data/libauthen-smb-perl-0.91/smbval/rfcnb-util.c:384:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((char *)&Socket.sin_addr, (char *)&Dest_IP, sizeof(Dest_IP));
data/libauthen-smb-perl-0.91/smbval/rfcnb-util.c:421:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char resp[16];
data/libauthen-smb-perl-0.91/smbval/rfcnb-util.c:517:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(Dest_IP, (resp + RFCNB_Pkt_IP_Offset), sizeof(struct in_addr));
data/libauthen-smb-perl-0.91/smbval/session.c:115:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((char *)&(redir_addr -> ip_addr), (char *)&Dest_IP, sizeof(Dest_IP));
data/libauthen-smb-perl-0.91/smbval/smbdes.c:158:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out[64];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pk1[56];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:185:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char c[28];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char d[28];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:187:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cd[56];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ki[16][48];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pd1[64];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:190:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char l[32], r[32];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:191:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char rl[64];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char er[48];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:217:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char erk[48];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:218:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char b[8][6];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:219:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char cb[32];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:220:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pcb[32];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:221:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char r2[32];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:281:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char outb[64];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:282:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char inb[64];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:283:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char keyb[64];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:284:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char key2[8];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:308:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char sp8[8] = {0x4b, 0x47, 0x53, 0x21, 0x40, 0x23, 0x24, 0x25};
data/libauthen-smb-perl-0.91/smbval/smbdes.c:322:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[8];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:330:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[8];
data/libauthen-smb-perl-0.91/smbval/smbdes.c:331:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static unsigned char key2[8];
data/libauthen-smb-perl-0.91/smbval/smbencrypt.c:128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char passwd[130];
data/libauthen-smb-perl-0.91/smbval/smblib-common.h:178:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char resume_key[21];        /* Don't touch this          */
data/libauthen-smb-perl-0.91/smbval/smblib-common.h:182:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[13];                   /* The name of the file      */
data/libauthen-smb-perl-0.91/smbval/smblib-priv.h:550:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char service[80], username[80], password[80], desthost[80], sock_options[80];
data/libauthen-smb-perl-0.91/smbval/smblib-priv.h:551:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char address[80], myname[80];
data/libauthen-smb-perl-0.91/smbval/smblib-priv.h:575:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Encrypt_Key[80], Domain[80], PDomain[80], OSName[80], LMType[40];
data/libauthen-smb-perl-0.91/smbval/smblib-priv.h:576:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char Svr_OS[80], Svr_LMType[80], Svr_PDom[80];
data/libauthen-smb-perl-0.91/smbval/smblib-priv.h:594:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[129];
data/libauthen-smb-perl-0.91/smbval/smblib-priv.h:595:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char device_type[20];
data/libauthen-smb-perl-0.91/smbval/smblib-priv.h:606:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[256];          /* We should malloc this ... */
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:56:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char SMB_Time_Temp[48];
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:69:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(SMB_Time_Temp, "%2d/%02d/%2d %2d:%02d:%02d", DOS_day, DOS_month,
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:82:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
{ static char SMB_Attrib_Temp[128];
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:363:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(Con_Handle->Encrypt_Key, p, 8);
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:386:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(Con_Handle -> Encrypt_Key, p, 8);
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:772:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prot_msg[1024];
data/libauthen-smb-perl-0.91/smbval/smblib.c:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp[80], called[80], calling[80], *address;
data/libauthen-smb-perl-0.91/smbval/smblib.c:212:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp[80], called[80], calling[80];
data/libauthen-smb-perl-0.91/smbval/smblib.c:325:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char *p, pword[128];
data/libauthen-smb-perl-0.91/smbval/smblib.c:393:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, pword, pass_len);
data/libauthen-smb-perl-0.91/smbval/smblib.c:460:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, pword, pass_len);
data/libauthen-smb-perl-0.91/smbval/rfcnb-io.c:104:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    bytes_read = read(con -> fd, temp, this_read);
data/libauthen-smb-perl-0.91/smbval/rfcnb-io.c:253:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((read_len = read(con -> fd, hdr, sizeof(hdr))) < 0) { /* Problems */
data/libauthen-smb-perl-0.91/smbval/rfcnb-io.c:356:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((this_time = read(con -> fd, (pkt_frag -> data) + offset, this_len)) <= 0) { /* Problems */
data/libauthen-smb-perl-0.91/smbval/rfcnb-util.c:46:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(name1);
data/libauthen-smb-perl-0.91/smbval/session.c:360:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(msg_buf, RFCNB_Error_Strings[abs(code)], len);
data/libauthen-smb-perl-0.91/smbval/smbencrypt.c:100:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen((char *)passwd);
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:214:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    prots_len = prots_len + strlen(Prots[i]) + 2; /* Account for null etc */
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:267:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p = p + strlen(Prots[i]) + 2; /* Adjust len of p for null plus dialectID */
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:367:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(p, Con_Handle -> Svr_PDom, sizeof(Con_Handle -> Svr_PDom) - 1);
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:389:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(p, Con_Handle -> Svr_PDom, sizeof(Con_Handle -> Svr_PDom) - 1);
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:421:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(name, "unknown", len);
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:465:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  param_len = strlen(path) + 2 + strlen(password) + 2 + strlen(device) + 2;
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:465:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  param_len = strlen(path) + 2 + strlen(password) + 2 + strlen(device) + 2;
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:465:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  param_len = strlen(path) + 2 + strlen(password) + 2 + strlen(device) + 2;
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:503:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tree -> path, path, sizeof(tree -> path));
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:504:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tree -> device_type, device, sizeof(tree -> device_type));
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:524:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p = p + strlen(path) + 2;
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:527:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  p = p + strlen(password) + 2;
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:765:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(msgbuf, 
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:776:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(msgbuf,
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:782:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(msgbuf) < len) { /* If there is space, put rest in */
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:784:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
      strncat(msgbuf, "\n\t", len - strlen(msgbuf));
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:784:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strncat(msgbuf, "\n\t", len - strlen(msgbuf));
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:788:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(msgbuf, prot_msg, len - strlen(msgbuf));
data/libauthen-smb-perl-0.91/smbval/smblib-util.c:788:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strncat(msgbuf, prot_msg, len - strlen(msgbuf));
data/libauthen-smb-perl-0.91/smbval/smblib.c:134:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(con -> service, "");
data/libauthen-smb-perl-0.91/smbval/smblib.c:135:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(con -> username, "");
data/libauthen-smb-perl-0.91/smbval/smblib.c:136:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(con -> password, "");
data/libauthen-smb-perl-0.91/smbval/smblib.c:137:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(con -> sock_options, "");
data/libauthen-smb-perl-0.91/smbval/smblib.c:138:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(con -> address, "");
data/libauthen-smb-perl-0.91/smbval/smblib.c:159:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i=0; i < strlen(server); i++)
data/libauthen-smb-perl-0.91/smbval/smblib.c:162:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  called[strlen(server)] = 0;    /* Make it a string */
data/libauthen-smb-perl-0.91/smbval/smblib.c:164:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i=0; i < strlen(con -> myname); i++)
data/libauthen-smb-perl-0.91/smbval/smblib.c:167:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  calling[strlen(con -> myname)] = 0;    /* Make it a string */
data/libauthen-smb-perl-0.91/smbval/smblib.c:234:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(con -> sock_options, "");
data/libauthen-smb-perl-0.91/smbval/smblib.c:235:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(con -> address, "");
data/libauthen-smb-perl-0.91/smbval/smblib.c:261:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i=0; i < strlen(host); i++)
data/libauthen-smb-perl-0.91/smbval/smblib.c:264:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  called[strlen(host)] = 0;    /* Make it a string */
data/libauthen-smb-perl-0.91/smbval/smblib.c:266:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (i=0; i < strlen(con -> myname); i++)
data/libauthen-smb-perl-0.91/smbval/smblib.c:269:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  calling[strlen(con -> myname)] = 0;    /* Make it a string */
data/libauthen-smb-perl-0.91/smbval/smblib.c:346:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pass_len=strlen(pword);
data/libauthen-smb-perl-0.91/smbval/smblib.c:353:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    param_len = strlen(UserName) + 1 + pass_len + 1 + 
data/libauthen-smb-perl-0.91/smbval/smblib.c:354:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                strlen(Con_Handle -> PDomain) + 1 + 
data/libauthen-smb-perl-0.91/smbval/smblib.c:355:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	        strlen(Con_Handle -> OSName) + 1;
data/libauthen-smb-perl-0.91/smbval/smblib.c:398:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p = p + strlen(UserName);
data/libauthen-smb-perl-0.91/smbval/smblib.c:404:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p = p + strlen(Con_Handle -> PDomain);
data/libauthen-smb-perl-0.91/smbval/smblib.c:409:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p = p + strlen(Con_Handle -> OSName);
data/libauthen-smb-perl-0.91/smbval/smblib.c:417:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    param_len = strlen(UserName) + 1 + pass_len + 
data/libauthen-smb-perl-0.91/smbval/smblib.c:418:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                strlen(Con_Handle -> PDomain) + 1 + 
data/libauthen-smb-perl-0.91/smbval/smblib.c:419:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	        strlen(Con_Handle -> OSName) + 1 +
data/libauthen-smb-perl-0.91/smbval/smblib.c:420:3:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strlen(Con_Handle -> LMType) + 1;
data/libauthen-smb-perl-0.91/smbval/smblib.c:465:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p = p + strlen(UserName);
data/libauthen-smb-perl-0.91/smbval/smblib.c:471:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p = p + strlen(Con_Handle -> PDomain);
data/libauthen-smb-perl-0.91/smbval/smblib.c:476:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p = p + strlen(Con_Handle -> OSName);
data/libauthen-smb-perl-0.91/smbval/smblib.c:481:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    p = p + strlen(Con_Handle -> LMType);

ANALYSIS SUMMARY:

Hits = 149
Lines analyzed = 4978 in approximately 0.21 seconds (23569 lines/second)
Physical Source Lines of Code (SLOC) = 2736
Hits@level = [0]  55 [1]  55 [2]  61 [3]   0 [4]  33 [5]   0
Hits@level+ = [0+] 204 [1+] 149 [2+]  94 [3+]  33 [4+]  33 [5+]   0
Hits/KSLOC@level+ = [0+] 74.5614 [1+] 54.4591 [2+] 34.3567 [3+] 12.0614 [4+] 12.0614 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.