Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/libfilesys-smbclient-perl-3.2/libauthSamba.c Examining data/libfilesys-smbclient-perl-3.2/libauthSamba.h FINAL RESULTS: data/libfilesys-smbclient-perl-3.2/libauthSamba.c:20:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(User, username); data/libfilesys-smbclient-perl-3.2/libauthSamba.c:21:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Password, password); data/libfilesys-smbclient-perl-3.2/libauthSamba.c:25:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf("Workgroup is set to %s", workgroup); data/libfilesys-smbclient-perl-3.2/libauthSamba.c:27:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(Workgroup, workgroup); data/libfilesys-smbclient-perl-3.2/libauthSamba.c:47:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf("Workgroup is set to %s", Workgroup); data/libfilesys-smbclient-perl-3.2/libauthSamba.c:49:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(workgroup, Workgroup); data/libfilesys-smbclient-perl-3.2/libauthSamba.c:52:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(username, User); data/libfilesys-smbclient-perl-3.2/libauthSamba.c:54:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(password, Password); data/libfilesys-smbclient-perl-3.2/libauthSamba.c:5:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char User[30]; data/libfilesys-smbclient-perl-3.2/libauthSamba.c:6:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Password[30]; data/libfilesys-smbclient-perl-3.2/libauthSamba.c:7:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char Workgroup[30]; data/libfilesys-smbclient-perl-3.2/libauthSamba.c:75:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[128]; data/libfilesys-smbclient-perl-3.2/libauthSamba.c:82:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (temp[strlen(temp) - 1] == 0x0a) /* A new line? */ data/libfilesys-smbclient-perl-3.2/libauthSamba.c:83:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). temp[strlen(temp) - 1] = 0x00; data/libfilesys-smbclient-perl-3.2/libauthSamba.c:85:16: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). if (temp[0]) strncpy(workgroup, temp, wgmaxlen - 1); data/libfilesys-smbclient-perl-3.2/libauthSamba.c:90:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (temp[strlen(temp) - 1] == 0x0a) /* A new line? */ data/libfilesys-smbclient-perl-3.2/libauthSamba.c:91:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). temp[strlen(temp) - 1] = 0x00; data/libfilesys-smbclient-perl-3.2/libauthSamba.c:93:16: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). if (temp[0]) strncpy(username, temp, unmaxlen - 1); data/libfilesys-smbclient-perl-3.2/libauthSamba.c:98:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (temp[strlen(temp) - 1] == 0x0a) /* A new line? */ data/libfilesys-smbclient-perl-3.2/libauthSamba.c:99:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). temp[strlen(temp) - 1] = 0x00; data/libfilesys-smbclient-perl-3.2/libauthSamba.c:101:16: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). if (temp[0]) strncpy(password, temp, pwmaxlen - 1); ANALYSIS SUMMARY: Hits = 21 Lines analyzed = 118 in approximately 0.03 seconds (4432 lines/second) Physical Source Lines of Code (SLOC) = 84 Hits@level = [0] 9 [1] 9 [2] 4 [3] 0 [4] 8 [5] 0 Hits@level+ = [0+] 30 [1+] 21 [2+] 12 [3+] 8 [4+] 8 [5+] 0 Hits/KSLOC@level+ = [0+] 357.143 [1+] 250 [2+] 142.857 [3+] 95.2381 [4+] 95.2381 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.