Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/libfixbuf-2.4.0+ds/include/fixbuf/private.h Examining data/libfixbuf-2.4.0+ds/include/fixbuf/public.h Examining data/libfixbuf-2.4.0+ds/include/fixbuf/autoinc.h Examining data/libfixbuf-2.4.0+ds/src/fbconnspec.c Examining data/libfixbuf-2.4.0+ds/src/fbsflow.c Examining data/libfixbuf-2.4.0+ds/src/fbnetflow.c Examining data/libfixbuf-2.4.0+ds/src/fbtemplate.c Examining data/libfixbuf-2.4.0+ds/src/fbcollector.c Examining data/libfixbuf-2.4.0+ds/src/fbuf.c Examining data/libfixbuf-2.4.0+ds/src/fbexporter.c Examining data/libfixbuf-2.4.0+ds/src/ipfixDump.c Examining data/libfixbuf-2.4.0+ds/src/fblistener.c Examining data/libfixbuf-2.4.0+ds/src/fbsession.c Examining data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c Examining data/libfixbuf-2.4.0+ds/src/fbxml.c Examining data/libfixbuf-2.4.0+ds/src/fbcollector.h Examining data/libfixbuf-2.4.0+ds/src/fbinfomodel.c FINAL RESULTS: data/libfixbuf-2.4.0+ds/src/ipfixDump.c:190:9: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, ("%s: Replace --yaf with --element-file and" data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:59:28: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __attribute__((format (printf, 2, 3))); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:124:9: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(fp, format, args); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:253:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(frac_str, sizeof(frac_str), ".%0*" PRIu64, frac_places, frac); data/libfixbuf-2.4.0+ds/include/fixbuf/private.h:77:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_GROUP_NAME]; data/libfixbuf-2.4.0+ds/include/fixbuf/private.h:107:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char privgroup[MAX_GROUP_NAME + 2]; data/libfixbuf-2.4.0+ds/include/fixbuf/private.h:115:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char recv_privgroup[MAX_GROUP_NAME + 2]; data/libfixbuf-2.4.0+ds/src/fbcollector.c:453:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(path, "r"); data/libfixbuf-2.4.0+ds/src/fbcollector.c:781:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(collector->peer.so), from, data/libfixbuf-2.4.0+ds/src/fbcollector.c:802:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(udp->peer.so), from, (fromlen > sizeof(udp->peer)) ? data/libfixbuf-2.4.0+ds/src/fbcollector.c:993:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(collector->peer.so), peer, data/libfixbuf-2.4.0+ds/src/fbcollector.c:1293:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(collector->peer.so), peer, data/libfixbuf-2.4.0+ds/src/fbcollector.c:1336:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char grp[MAX_GROUP_NAME]; data/libfixbuf-2.4.0+ds/src/fbcollector.c:1471:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sender[MAX_GROUP_NAME]; data/libfixbuf-2.4.0+ds/src/fbcollector.c:1855:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(collector->peer.so), address, data/libfixbuf-2.4.0+ds/src/fbexporter.c:141:31: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). exporter->stream.fp = fopen(exporter->spec.path, "w"); data/libfixbuf-2.4.0+ds/src/fbexporter.c:273:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(exporter->stream.buffer, msgbase, msglen); data/libfixbuf-2.4.0+ds/src/fbexporter.c:964:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char grp[MAX_GROUP_NAME]; data/libfixbuf-2.4.0+ds/src/fbexporter.c:968:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sender[MAX_GROUP_NAME]; data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:165:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(revname, FB_IE_REVERSE_STR, FB_IE_REVERSE_STRLEN); data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:200:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(found, model_ie, sizeof(*found)); data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:214:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char revname[FB_IE_REVERSE_BUFSZ]; data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:546:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[500]; data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:547:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char description[4096]; data/libfixbuf-2.4.0+ds/src/fbnetflow.c:91:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ru16_t16val, ru16_t16ptr, sizeof(uint16_t)); \ data/libfixbuf-2.4.0+ds/src/fbnetflow.c:99:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ru16_t16val, ru16_t16ptr, sizeof(uint16_t)); \ data/libfixbuf-2.4.0+ds/src/fbnetflow.c:106:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ru16_t16ptr, &ru16_t16val, sizeof(uint16_t)); \ data/libfixbuf-2.4.0+ds/src/fbnetflow.c:126:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ru32_t32val, ru32_t32ptr, sizeof(uint32_t)); \ data/libfixbuf-2.4.0+ds/src/fbnetflow.c:135:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ru32_t32val, ru32_t32ptr, sizeof(uint32_t)); \ data/libfixbuf-2.4.0+ds/src/fbnetflow.c:142:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ru32_t32ptr, &ru32_t32val, sizeof(uint32_t)); \ data/libfixbuf-2.4.0+ds/src/fbnetflow.c:1310:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msgOsetPtr, &(transState->sysUpTime), data/libfixbuf-2.4.0+ds/src/fbsflow.c:99:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ru16_t16val, ru16_t16ptr, sizeof(uint16_t)); \ data/libfixbuf-2.4.0+ds/src/fbsflow.c:107:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ru16_t16val, ru16_t16ptr, sizeof(uint16_t)); \ data/libfixbuf-2.4.0+ds/src/fbsflow.c:114:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ru16_t16ptr, &ru16_t16val, sizeof(uint16_t)); \ data/libfixbuf-2.4.0+ds/src/fbsflow.c:134:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ru32_t32val, ru32_t32ptr, sizeof(uint32_t)); \ data/libfixbuf-2.4.0+ds/src/fbsflow.c:143:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ru32_t32val, ru32_t32ptr, sizeof(uint32_t)); \ data/libfixbuf-2.4.0+ds/src/fbsflow.c:150:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ru32_t32ptr, &ru32_t32val, sizeof(uint32_t)); \ data/libfixbuf-2.4.0+ds/src/fbsflow.c:569:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sflowrec->sourceMacAddress, data, 6); data/libfixbuf-2.4.0+ds/src/fbsflow.c:571:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sflowrec->destinationMacAddress, data, 6); data/libfixbuf-2.4.0+ds/src/fbsflow.c:651:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sflowrec->sourceIPv6Address, &(iph->ip6_src), 16); data/libfixbuf-2.4.0+ds/src/fbsflow.c:652:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sflowrec->destinationIPv6Address, &(iph->ip6_dst), 16); data/libfixbuf-2.4.0+ds/src/fbsflow.c:766:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sflowrec->sourceMacAddress, data, 6); data/libfixbuf-2.4.0+ds/src/fbsflow.c:769:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sflowrec->destinationMacAddress, data, 6); data/libfixbuf-2.4.0+ds/src/fbsflow.c:795:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sflowrec->sourceIPv6Address, data, 16); data/libfixbuf-2.4.0+ds/src/fbsflow.c:797:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sflowrec->destinationIPv6Address, data, 16); data/libfixbuf-2.4.0+ds/src/fbsflow.c:1085:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sflowrec->nextHopIPv6Address, dataBuf+4, 16); data/libfixbuf-2.4.0+ds/src/fbsflow.c:1111:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sflowrec->bgpNextHopIPv6Address, dataBuf+4, 16); data/libfixbuf-2.4.0+ds/src/fbsflow.c:1224:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sflowrec->inoct, dataBuf+24, 8); data/libfixbuf-2.4.0+ds/src/fbsflow.c:1232:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&sflowrec->outoct, dataBuf+56, 8); data/libfixbuf-2.4.0+ds/src/fbsflow.c:1334:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sflowrec.collectorIPv6Address, msgOsetPtr, 16); data/libfixbuf-2.4.0+ds/src/fbsflow.c:1380:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dataBuf, transState->ipfixBuffer, msglen); data/libfixbuf-2.4.0+ds/src/fbsflow.c:1526:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sflowctr.ipv6, sflowrec.collectorIPv6Address, 16); data/libfixbuf-2.4.0+ds/src/fbsflow.c:1544:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sflowctr.ipv6, sflowrec.collectorIPv6Address, 16); data/libfixbuf-2.4.0+ds/src/fbsflow.c:1589:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dataBuf, transState->ipfixBuffer, msglen); data/libfixbuf-2.4.0+ds/src/fbuf.c:519:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&_x, _ptr_, sizeof(uint16_t)); \ data/libfixbuf-2.4.0+ds/src/fbuf.c:525:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&_x, _ptr_, sizeof(uint32_t)); \ data/libfixbuf-2.4.0+ds/src/fbuf.c:531:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_ptr_, &_x, sizeof(uint16_t)); \ data/libfixbuf-2.4.0+ds/src/fbuf.c:536:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_ptr_, &_x, sizeof(uint32_t)); \ data/libfixbuf-2.4.0+ds/src/fbuf.c:785:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp, sp, d_len); data/libfixbuf-2.4.0+ds/src/fbuf.c:788:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp, sp + (s_len - d_len), d_len); data/libfixbuf-2.4.0+ds/src/fbuf.c:790:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp, sp, d_len); data/libfixbuf-2.4.0+ds/src/fbuf.c:795:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp + (d_len - s_len), sp, s_len); data/libfixbuf-2.4.0+ds/src/fbuf.c:797:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp, sp, s_len); data/libfixbuf-2.4.0+ds/src/fbuf.c:853:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp, sp, d_len); data/libfixbuf-2.4.0+ds/src/fbuf.c:856:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp, sp, d_len); data/libfixbuf-2.4.0+ds/src/fbuf.c:858:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp, sp + (s_len - d_len), d_len); data/libfixbuf-2.4.0+ds/src/fbuf.c:863:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp, sp, s_len); data/libfixbuf-2.4.0+ds/src/fbuf.c:865:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp + (d_len - s_len), sp, s_len); data/libfixbuf-2.4.0+ds/src/fbuf.c:900:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp, sp, d_len); data/libfixbuf-2.4.0+ds/src/fbuf.c:904:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp, sp + (s_len - d_len), d_len); data/libfixbuf-2.4.0+ds/src/fbuf.c:906:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp, sp, d_len); data/libfixbuf-2.4.0+ds/src/fbuf.c:911:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp + (d_len - s_len), sp, s_len); data/libfixbuf-2.4.0+ds/src/fbuf.c:913:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp, sp, s_len); data/libfixbuf-2.4.0+ds/src/fbuf.c:952:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sv, sp, sizeof(fbVarfield_t)); data/libfixbuf-2.4.0+ds/src/fbuf.c:972:29: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (sv->len && sv->buf) memcpy(*dp, sv->buf, sv->len); data/libfixbuf-2.4.0+ds/src/fbuf.c:1022:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dp, dv, sizeof(fbVarfield_t)); data/libfixbuf-2.4.0+ds/src/fbuf.c:1354:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(basicList, src, sizeof(fbBasicList_t)); data/libfixbuf-2.4.0+ds/src/fbuf.c:1517:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(basicList, *dst, sizeof(fbBasicList_t)); data/libfixbuf-2.4.0+ds/src/fbuf.c:1704:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dst, basicList, sizeof(fbBasicList_t)); data/libfixbuf-2.4.0+ds/src/fbuf.c:1735:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(subTemplateList, src, sizeof(fbSubTemplateList_t)); data/libfixbuf-2.4.0+ds/src/fbuf.c:1859:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(subTemplateList, *dst, sizeof(fbSubTemplateList_t)); data/libfixbuf-2.4.0+ds/src/fbuf.c:2041:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dst, subTemplateList, sizeof(fbSubTemplateList_t)); data/libfixbuf-2.4.0+ds/src/fbuf.c:2074:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(multiList, src, sizeof(fbSubTemplateMultiList_t)); data/libfixbuf-2.4.0+ds/src/fbuf.c:2209:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(multiList, *dst, sizeof(fbSubTemplateMultiList_t)); data/libfixbuf-2.4.0+ds/src/fbuf.c:2407:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*dst, multiList, sizeof(fbSubTemplateMultiList_t)); data/libfixbuf-2.4.0+ds/src/fbuf.c:2961:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fbuf->setbase + 2, &setlen, sizeof(setlen)); data/libfixbuf-2.4.0+ds/src/fbuf.c:2991:39: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. fbSessionSetGroup(fbuf->session, (char *)groups[0]); data/libfixbuf-2.4.0+ds/src/fbuf.c:3452:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fbuf->msgbase + 2, &msglen, sizeof(msglen)); data/libfixbuf-2.4.0+ds/src/fbuf.c:4593:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newDataPtr, basicList->dataPtr, basicList->dataLength); data/libfixbuf-2.4.0+ds/src/fbuf.c:4842:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newDataPtr, sTL->dataPtr, sTL->dataLength.length); data/libfixbuf-2.4.0+ds/src/fbuf.c:4948:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newFirstEntry, sTML->firstEntry, data/libfixbuf-2.4.0+ds/src/fbuf.c:5071:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newDataPtr, entry->dataPtr, entry->dataLength); data/libfixbuf-2.4.0+ds/src/ipfixDump.c:307:22: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). infile = fopen(inspec, "r"); data/libfixbuf-2.4.0+ds/src/ipfixDump.c:329:23: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). outfile = fopen(outspec, "w"); data/libfixbuf-2.4.0+ds/src/ipfixDump.c:484:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[UINT16_MAX]; data/libfixbuf-2.4.0+ds/src/ipfixDump.c:511:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name, (char *)var.buf, len); data/libfixbuf-2.4.0+ds/src/ipfixDump.c:515:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name, (char *)b, len); data/libfixbuf-2.4.0+ds/src/ipfixDump.c:570:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rec.ie_pen, b, ie->len); data/libfixbuf-2.4.0+ds/src/ipfixDump.c:572:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((((uint8_t *)&rec.ie_pen) data/libfixbuf-2.4.0+ds/src/ipfixDump.c:607:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rec.ie_range_begin, b, ie->len); data/libfixbuf-2.4.0+ds/src/ipfixDump.c:609:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((((uint8_t *)&rec.ie_range_begin) data/libfixbuf-2.4.0+ds/src/ipfixDump.c:621:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&rec.ie_range_end, b, ie->len); data/libfixbuf-2.4.0+ds/src/ipfixDump.c:623:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((((uint8_t *)&rec.ie_range_end) data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:215:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:248:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char frac_str[32] = ""; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:392:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dt_str[25]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:393:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix[PREFIX_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:459:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_prefix[PREFIX_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:460:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_template[TMPL_NAME_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:491:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix[PREFIX_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:492:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_prefix[PREFIX_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:493:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_template[TMPL_NAME_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:494:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_semantic[SEMANTIC_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:531:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix[PREFIX_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:532:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_prefix[PREFIX_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:533:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_semantic[SEMANTIC_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:568:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix[PREFIX_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:569:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_prefix[PREFIX_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:570:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_elem[ELEMENT_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:571:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_semantic[SEMANTIC_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:620:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(((uint8_t *)(&u64)) + (8 - ie->len), val, ie->len); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:622:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&u64, val, ie->len); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:641:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(((uint8_t *)(&i64)) + (8 - ie->len), val, ie->len); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:643:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&i64, val, ie->len); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:666:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip_buf[40]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:752:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[UINT16_MAX + 1]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:757:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, val, len); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:767:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(((uint8_t *)(&u64)) + (8 - ie->len), val, ie->len); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:769:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&u64, val, ie->len); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:790:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char charbuf[2 * UINT16_MAX + 1]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:825:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_prefix[PREFIX_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:826:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_elem[ELEMENT_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:827:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_tmpl[TMPL_NAME_BUFSIZ]; data/libfixbuf-2.4.0+ds/src/fbcollector.c:440:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(path) == 1) && (path[0] == '-')) data/libfixbuf-2.4.0+ds/src/fbcollector.c:579:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(collector->rip, &byte, sizeof(byte)); data/libfixbuf-2.4.0+ds/src/fbcollector.c:617:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read(collector->stream.fd, msgbase, rrem); data/libfixbuf-2.4.0+ds/src/fbcollector.c:651:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read(collector->stream.fd, msgbase, rrem); data/libfixbuf-2.4.0+ds/src/fbcollector.c:1410:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( grp, spread->groups[i].name, sizeof( grp) - 2 ); data/libfixbuf-2.4.0+ds/src/fbcollector.c:1411:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( grp, "T" ); data/libfixbuf-2.4.0+ds/src/fbconnspec.c:259:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pwbuf, (const char *)vpwstr, pwsz); data/libfixbuf-2.4.0+ds/src/fbconnspec.c:260:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen(pwbuf); data/libfixbuf-2.4.0+ds/src/fbconnspec.c:466:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( spec->groups[n++].name, *g, MAX_GROUP_NAME-1 ); data/libfixbuf-2.4.0+ds/src/fbexporter.c:127:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(exporter->spec.path) == 1) && data/libfixbuf-2.4.0+ds/src/fbexporter.c:1000:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(grp, spread->groups[i].name, sizeof(grp) - 2); data/libfixbuf-2.4.0+ds/src/fbexporter.c:1001:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(grp, "T"); data/libfixbuf-2.4.0+ds/src/fbexporter.c:1268:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(spread->groups_to_send[n].name, *g, MAX_GROUP_NAME-1); data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:158:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(revname + FB_IE_REVERSE_STRLEN, fwdname, revname_sz - FB_IE_REVERSE_STRLEN - 1); data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:518:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rec.ie_name.len = strlen(model_ie->ref.name); data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:521:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rec.ie_desc.len = strlen(model_ie->description); data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:559:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name, (char *)rec->ie_name.buf, len); data/libfixbuf-2.4.0+ds/src/fbinfomodel.c:564:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(description, (char *)rec->ie_desc.buf, len); data/libfixbuf-2.4.0+ds/src/fblistener.c:830:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(pfd->fd, &byte, sizeof(byte)); data/libfixbuf-2.4.0+ds/src/fblistener.c:916:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(pfd->fd, &byte, sizeof(byte)); data/libfixbuf-2.4.0+ds/src/fblistener.c:1251:29: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). read(cpfd->fd, &byte, sizeof(byte)); data/libfixbuf-2.4.0+ds/src/fbnetflow.c:372:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read(collector->stream.fd, bufOffset, 4); data/libfixbuf-2.4.0+ds/src/fbnetflow.c:387:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read(collector->stream.fd, bufOffset, 12); data/libfixbuf-2.4.0+ds/src/fbnetflow.c:426:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read(collector->stream.fd, bufOffset, 4); data/libfixbuf-2.4.0+ds/src/fbnetflow.c:451:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). rc = read(collector->stream.fd, bufOffset, setLength); data/libfixbuf-2.4.0+ds/src/fbsession.c:981:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(session->all_groups[loop].name)) == 0) data/libfixbuf-2.4.0+ds/src/fbtemplate.c:398:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). metadata_rec->template_name.len = strlen(name); data/libfixbuf-2.4.0+ds/src/fbtemplate.c:403:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). metadata_rec->template_description.len = strlen(description); data/libfixbuf-2.4.0+ds/src/ipfixDump.c:304:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(inspec) == 1) && inspec[0] == '-') { data/libfixbuf-2.4.0+ds/src/ipfixDump.c:326:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(outspec) == 1) && outspec[0] == '-') { data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:272:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "octet", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:275:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "uint8", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:278:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "uint16", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:281:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "uint32", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:284:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "uint64", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:287:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "int8", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:290:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "int16", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:293:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "int32", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:296:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "int64", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:299:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "float32", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:302:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "float64", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:305:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "bool", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:308:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "mac", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:311:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "string", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:314:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "sec", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:317:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "millisec", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:320:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "microsec", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:323:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "nanosec", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:326:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "ipv4", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:329:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "ipv6", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:332:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "bl", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:335:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "stl", dt_str_bufsiz); data/libfixbuf-2.4.0+ds/src/ipfixDumpPrint.c:338:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(dt_str, "stml", dt_str_bufsiz); ANALYSIS SUMMARY: Hits = 186 Lines analyzed = 26051 in approximately 0.79 seconds (32904 lines/second) Physical Source Lines of Code (SLOC) = 14446 Hits@level = [0] 145 [1] 53 [2] 129 [3] 0 [4] 4 [5] 0 Hits@level+ = [0+] 331 [1+] 186 [2+] 133 [3+] 4 [4+] 4 [5+] 0 Hits/KSLOC@level+ = [0+] 22.9129 [1+] 12.8755 [2+] 9.2067 [3+] 0.276893 [4+] 0.276893 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.