Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/linux-wlan-ng-0.2.9+dfsg/src/wlanctl/wlanctl.h Examining data/linux-wlan-ng-0.2.9+dfsg/src/wlanctl/wlanctl.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/wlanctl/help.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/mkmeta/mkmetadef.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/mkmeta/mkmetastruct.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/nwepgen/nwepgen.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/p80211conv.h Examining data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/p80211types.h Examining data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/p80211hdr.h Examining data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/p80211netdev.h Examining data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/p80211metamib.h Examining data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/p80211ioctl.h Examining data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/p80211meta.h Examining data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/p80211metamsg.h Examining data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/wlan_compat.h Examining data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/p80211req.h Examining data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/p80211msg.h Examining data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/p80211mgmt.h Examining data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/prism2/include/prism2/prism2mgmt.h Examining data/linux-wlan-ng-0.2.9+dfsg/src/prism2/include/prism2/hfa384x.h Examining data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkmiblist.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x_usb.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2_cs.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2_pci.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2sta.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mgmt.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2_plx.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2_usb.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211metamsg.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211meta.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211metamib.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wep.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211req.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211mod.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c Examining data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c Examining data/linux-wlan-ng-0.2.9+dfsg/scripts/get_version.c Examining data/linux-wlan-ng-0.2.9+dfsg/add-ons/lwepgen/lwepgen.c Examining data/linux-wlan-ng-0.2.9+dfsg/add-ons/keygen/keygen.c Examining data/linux-wlan-ng-0.2.9+dfsg/doc/codingstd/format.srcfile.c Examining data/linux-wlan-ng-0.2.9+dfsg/debian/srec2fw.c FINAL RESULTS: data/linux-wlan-ng-0.2.9+dfsg/src/nwepgen/nwepgen.c:95:4: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf((j < keylen-1) ? "%02x:" : "%02x\n", wep_key[i][j]); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1059:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(wlandev->name, dev->name); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1188:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. p += sprintf(p, "p80211 version: %s (%s)\n\n", data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1190:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. p += sprintf(p, "name : %s\n", wlandev->name); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1191:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. p += sprintf(p, "nsd name : %s\n", wlandev->nsdname); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1195:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. p += sprintf(p, "nsd caps : %s%s%s%s%s%s%s%s%s%s\n", data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1212:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. p += sprintf(p, "Enabled : %s%s\n", data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1460:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ifname, "INTERFACE=%s", wlandev->name); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1461:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(nsdname, "NSDNAME=%s", wlandev->nsdname); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1467:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(wlan_wext, "WLAN_WEXT=%s", wlan_wext_write ? "y" : ""); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1468:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(action_str, "ACTION=%s", action); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:376:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( appname, APPNAME ); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:456:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME": too many RAM files on cmd line. Exiting.\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:465:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME": too many FLASH files on cmd line. Exiting.\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:474:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME": too many ADDPDR files on cmd line. Exiting.\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:483:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME": -p specified more than once. Exiting.\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:495:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME": -m specified more than once. Exiting.\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:499:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME": mac address format error. Exiting.\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:507:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME": -S specified more than once. Exiting.\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:514:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME": unrecognized option -%c.\n", optch); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:523:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME": -n and -d are mutually exclusive. Exiting.\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:532:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME": missing argument - devname\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:571:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(getmsg.devname, devname); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:681:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME ": error, you must specifify a pda location\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:696:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:710:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME ": Can't flash a RAM download image!\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:715:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME ": Incompatible firmware image.\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:726:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:734:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:745:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:763:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:777:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME ": Incompatible firmware image.\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:782:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME ": Can't RAM download a Flash image!\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:793:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:801:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:817:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:830:2: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(APPNAME": finished.\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:885:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:937:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( req.name, msg->devname); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1068:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME": failed to allocate image space, exitting.\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1095:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1208:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1244:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(statemsg.devname, devname); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1255:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(writemsg.devname, devname); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1277:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1283:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1302:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1308:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1322:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1328:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1387:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1409:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1424:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1549:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(msg.devname, dev); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1599:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME": invalid pdr length (0x%04x) encountered (pdrcode=0x%04x), exiting.\n", pdrlen, pdrcode); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1633:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf( stderr, APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1713:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, APPNAME": failed to compile pda regexp err=%s.\n", ebuf); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1828:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME":%s:%d warning: No initial \'S\'\n", fname, line); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1844:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME":%s:%d warning: Unknown S-record detected.\n", fname, line); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:2151:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fstatemsg.devname, devname); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:2162:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fwritemsg.devname, devname); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:2179:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(rstatemsg.devname, devname); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:2193:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(rwritemsg.devname, devname); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:2221:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:2229:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:2290:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:2298:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:2324:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:2332:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr,APPNAME data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x.c:3753:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(msg->devname, wlandev->name); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x_usb.c:4402:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(msg->devname, wlandev->name); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2_cs.c:578:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(hw->node.dev_name, wlandev->name); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2_cs.c:1110:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(hw->node.dev_name, wlandev->name); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2sta.c:2390:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. p += sprintf(p, "# %s version %s (%s) '%s'\n\n", data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkmiblist.c:77:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( ifname, "%s", argv[1] ); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkmiblist.c:78:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( ofname1, "%s.txt", argv[2] ); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:80:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( ifname, "%s", argv[1] ); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:81:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( ofname1, "%s.html", argv[2] ); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:82:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( ofname2, "%s.txt", argv[2] ); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:203:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(text, P80211ENUM_BADSTR); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:207:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( text, ep->list[i].name ); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:252:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=\'", meta->name); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:256:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=\'%s\'", meta->name, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:263:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=\'%s\'", meta->name, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:271:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "0x%08x=\"%s\"", did, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:451:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=", meta->name); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:461:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=%s", meta->name, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:468:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=\"%s\"", meta->name, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:476:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "0x%08x=\"%s\"", did, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:668:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=%u", meta->name, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:671:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=%s", meta->name, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:678:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=\"%s\"", meta->name, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:686:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "0x%08x=\"%s\"", did, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:851:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=%s", data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:864:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=\"%s\"", data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:868:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=%s", meta->name, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:875:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=\"%s\"", meta->name, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:883:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "0x%08x=\"%s\"", did, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1060:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1064:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1071:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=%s=%s", data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1081:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "0x%08x=\"%s\"", mibdid, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1088:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=\"%s\"", meta->name, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1096:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "0x%08x=\"%s\"", did, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1155:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1159:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1166:6: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=%s=%s", data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1176:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "0x%08x=\"%s\"", mibdid, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1183:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "%s=\"%s\"", meta->name, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1191:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( textbuf, "0x%08x=\"%s\"", did, data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1559:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(textbuf, "0x%08x=\"%s\"", did, error_msg); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1565:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(textbuf, "%s=\"%s\"", meta->name, error_msg); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1570:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(textbuf, "%s=%s", meta->name, NOT_SUPPORTED); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1574:18: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. buf = textbuf + sprintf(textbuf, "%s=", meta->name); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1577:10: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. buf += sprintf(buf, (i == 0) ? "%u" : ",%u", data[i]); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1772:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(textbuf, "0x%08x=\"%s\"", did, error_msg); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1778:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(textbuf, "%s=\"%s\"", meta->name, error_msg); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1783:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(textbuf, "%s=%s", meta->name, NOT_SUPPORTED); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1789:18: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. buf = textbuf + sprintf(textbuf, "%s=", meta->name); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1970:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(textbuf, "0x%08x=\"%s\"", did, error_msg); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1976:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(textbuf, "%s=\"%s\"", meta->name, error_msg); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1981:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(textbuf, "%s=%s", meta->name, NOT_SUPPORTED); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1987:8: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. cnt = sprintf(textbuf, "%s=", meta->name); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1990:10: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. cnt += sprintf(textbuf+cnt, (i==0) ? data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:643:17: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf((mib->did & P80211DID_ACCESS_READ) ? data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:645:17: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf((mib->did & P80211DID_ACCESS_WRITE) ? data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:978:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(tmpstr+1, value); data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:1099:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(value, eq+1); data/linux-wlan-ng-0.2.9+dfsg/src/wlanctl/wlanctl.c:212:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( req.name, devname); data/linux-wlan-ng-0.2.9+dfsg/add-ons/keygen/keygen.c:148:17: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, "s")) != EOF) { data/linux-wlan-ng-0.2.9+dfsg/add-ons/lwepgen/lwepgen.c:138:17: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while((ch = getopt(argc, argv, "s")) != EOF) { data/linux-wlan-ng-0.2.9+dfsg/debian/srec2fw.c:80:16: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ((opt = getopt(argc, argv, "ws")) != -1) { data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:419:20: [3] (buffer) getopt: Some older implementations do not protect against internal buffer overflows (CWE-120, CWE-20). Check implementation on installation, or limit the size of all string inputs. while ( ((optch = getopt(argc, argv, opts)) != EOF) && (result == 0) ) { data/linux-wlan-ng-0.2.9+dfsg/add-ons/keygen/keygen.c:71:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(keys, buf, WEPSTRONGKEYSTORE); data/linux-wlan-ng-0.2.9+dfsg/add-ons/lwepgen/lwepgen.c:70:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(keys, buf, WEPKEYSTORE); data/linux-wlan-ng-0.2.9+dfsg/debian/srec2fw.c:96:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). infd = open(argv[optind], O_RDONLY); data/linux-wlan-ng-0.2.9+dfsg/debian/srec2fw.c:115:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). outfd = open(argv[optind+1], O_TRUNC|O_CREAT|O_WRONLY, 0644); data/linux-wlan-ng-0.2.9+dfsg/debian/srec2fw.c:207:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(record_new->data, &(record->addr), 4); data/linux-wlan-ng-0.2.9+dfsg/debian/srec2fw.c:238:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char zeroes[6] = {0, 0, 0, 0, 0, 0}; data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/p80211ioctl.h:107:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[WLAN_DEVNAMELEN_MAX]; data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/p80211netdev.h:184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[WLAN_DEVNAMELEN_MAX]; /* Dev name, from register_wlandev()*/ data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/p80211netdev.h:201:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int (*open)(struct wlandevice *wlandev); data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/p80211netdev.h:255:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spy_address[IW_MAX_SPY][ETH_ALEN]; data/linux-wlan-ng-0.2.9+dfsg/src/mkmeta/mkmetastruct.c:60:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[82]; data/linux-wlan-ng-0.2.9+dfsg/src/mkmeta/mkmetastruct.c:70:6: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name, "p80211msg"); data/linux-wlan-ng-0.2.9+dfsg/src/nwepgen/nwepgen.c:65:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void nwepgen(char *genstr, int keylen, UINT8 wep_key[WLAN_WEP_NKEYS][WLAN_WEP_MAXKEYLEN]); data/linux-wlan-ng-0.2.9+dfsg/src/nwepgen/nwepgen.c:81:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). keylen = (argc < 3) ? 5 : atoi(argv[2]); data/linux-wlan-ng-0.2.9+dfsg/src/nwepgen/nwepgen.c:131:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. nwepgen(char *genstr, int keylen, UINT8 wep_key[WLAN_WEP_NKEYS][WLAN_WEP_MAXKEYLEN]) data/linux-wlan-ng-0.2.9+dfsg/src/nwepgen/nwepgen.c:134:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char pseed[4]={0,0,0,0}; data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:185:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( e_snap->oui, oui_8021h, WLAN_IEEE_OUI_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:187:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( e_snap->oui, oui_rfc1042, WLAN_IEEE_OUI_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:206:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p80211_hdr->a3.a1, &e_hdr.daddr, WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:207:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p80211_hdr->a3.a2, wlandev->netdev->dev_addr, WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:208:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p80211_hdr->a3.a3, wlandev->bssid, WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:212:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p80211_hdr->a3.a1, wlandev->bssid, WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:213:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p80211_hdr->a3.a2, wlandev->netdev->dev_addr, WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:214:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p80211_hdr->a3.a3, &e_hdr.daddr, WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:218:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p80211_hdr->a3.a1, &e_hdr.daddr, WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:219:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p80211_hdr->a3.a2, wlandev->bssid, WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:220:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p80211_hdr->a3.a3, &e_hdr.saddr, WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:272:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wlandev->spy_address[i], mac, ETH_ALEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:326:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(daddr, w_hdr->a3.a1, WLAN_ETHADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:327:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(saddr, w_hdr->a3.a2, WLAN_ETHADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:329:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(daddr, w_hdr->a3.a1, WLAN_ETHADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:330:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(saddr, w_hdr->a3.a3, WLAN_ETHADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:332:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(daddr, w_hdr->a3.a3, WLAN_ETHADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:333:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(saddr, w_hdr->a3.a2, WLAN_ETHADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:341:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(daddr, w_hdr->a4.a3, WLAN_ETHADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:342:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(saddr, w_hdr->a4.a4, WLAN_ETHADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:425:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(e_hdr->daddr, daddr, WLAN_ETHADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:426:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(e_hdr->saddr, saddr, WLAN_ETHADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:464:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(e_hdr->daddr, daddr, WLAN_ETHADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:465:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(e_hdr->saddr, saddr, WLAN_ETHADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:491:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(e_hdr->daddr, daddr, WLAN_ETHADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211conv.c:492:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(e_hdr->saddr, saddr, WLAN_ETHADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:284:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( wlandev->open != NULL) { data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:285:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). result = wlandev->open(wlandev); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:533:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&p80211_hdr, skb->data, sizeof(p80211_hdr_t)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:817:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dot11req.devname, data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:830:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&macaddr->data.data, new_addr->sa_data, WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:850:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dev->dev_addr, new_addr->sa_data, dev->addr_len); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1192:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, "address : %02x:%02x:%02x:%02x:%02x:%02x\n", data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1208:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, "bssid : %02x:%02x:%02x:%02x:%02x:%02x\n", data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1215:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, "msdstate=%d\n", wlandev->msdstate); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1455:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *argv[3], *envp[7], ifname[12 + IFNAMSIZ], action_str[32]; data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1456:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nsdname[32], wlan_wext[32]; data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1463:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ifname, "INTERFACE=null"); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211netdev.c:1464:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(nsdname, "NSDNAME=null"); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wep.c:168:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wlandev->wep_keys[keynum], key, keylen); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wep.c:202:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key+3, wlandev->wep_keys[keyidx], keylen); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wep.c:274:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key+3, wlandev->wep_keys[keynum], keylen); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:162:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:173:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ssid[IW_ESSID_MAX_SIZE]; data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:207:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msg.ssid.data.data, ssid, data.length); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:295:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name, "IEEE 802.11-DS"); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:299:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name, "IEEE 802.11-b"); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:327:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:383:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:480:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:581:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ap_addr->sa_data, wlandev->bssid, WLAN_BSSID_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:624:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(key, wlandev->wep_keys[i], erq->length); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:692:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wlandev->wep_keys[i], key, erq->length); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:695:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pstr.data.data, key, erq->length); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:722:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &pstr, sizeof(pstr)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:782:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(essid, wlandev->ssid.data, data->length); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:838:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msg.ssid.data.data, essid, length); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:903:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:962:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1011:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1043:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1092:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1138:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1152:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1166:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1234:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1246:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1259:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1315:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1348:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&msg.mibattribute.data, &mibitem, sizeof(mibitem)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1383:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(address, extra, sizeof(struct sockaddr)*number); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1392:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wlandev->spy_address[i], address[i].sa_data, ETH_ALEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1426:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(address[i].sa_data, wlandev->spy_address[i], ETH_ALEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1428:18: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&spy_stat[i], &wlandev->spy_stat[i], sizeof(struct iw_quality)); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1438:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(extra, address, sizeof(struct sockaddr)*number); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1439:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(extra+sizeof(struct sockaddr)*number, spy_stat, sizeof(struct iw_quality)*number); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1528:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(iwe.u.ap_addr.sa_data, bss->bssid.data.data, WLAN_BSSID_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1537:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char essid[IW_ESSID_MAX_SIZE + 1]; data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1542:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&essid, bss->ssid.data.data, size); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1703:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wlandev->wep_keys[idx], ext->key, ext->key_len); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1707:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pstr->data.data, ext->key,ext->key_len); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:1786:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ext->key, wlandev->wep_keys[idx] , ext->key_len ); data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:2058:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ssid[IW_ESSID_MAX_SIZE+1]; data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:2079:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keybuf[MAX_KEYLEN]; data/linux-wlan-ng-0.2.9+dfsg/src/p80211/p80211wext.c:2151:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data.ap_addr.sa_data, wlandev->bssid, WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:208:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char appname[APPNAME_MAX + 1]; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:210:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char devname[16]; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:225:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rfname[RAMFILES_MAX][FILENAME_MAX+1]; /* -r filenames */ data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:228:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ffname[FLASHFILES_MAX][FILENAME_MAX+1]; /* -f filenames */ data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:232:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addpdrfname[ADDPDRFILES_MAX][FILENAME_MAX+1]; /* -a filenames */ data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:235:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newpdafname[FILENAME_MAX+1]; /* -p filename */ data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:241:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sernum[SERNUM_LEN_MAX+1]; /* -S serial # string */ data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1101:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( clist[j].data + coffset, s3data[i].data, s3data[i].len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1294:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(writemsg.data.data, pda->buf, writemsg.len.data); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1447:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( dest, &(pda->rec[j]->data), s3plug[i].len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1561:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pda->buf, msg.pda.data, HFA384x_PDA_LEN_MAX); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1629:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pda->rec[j], data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1645:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( endp, &(pdword[i]), (pdrlen + 1)*sizeof(UINT16)); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1692:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuf[PDAFILE_LINE_MAX]; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1697:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[100]; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1700:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). pdrfile = fopen(pdrfname, "r"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1805:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[SREC_LINE_MAX]; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1806:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[30]; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1817:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen(fname, "r"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1850:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuf, buf+S3LEN_TXTOFFSET, S3LEN_TXTLEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1854:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuf, buf+S3ADDR_TXTOFFSET, S3ADDR_TXTLEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1863:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuf, buf+S3PLUG_ITEMCODE_TXTOFFSET, S3PLUG_ITEMCODE_TXTLEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1868:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuf, buf+S3PLUG_ADDR_TXTOFFSET, S3PLUG_ADDR_TXTLEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1873:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuf, buf+S3PLUG_LEN_TXTOFFSET, S3PLUG_LEN_TXTLEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1890:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuf, buf+S3CRC_ADDR_TXTOFFSET, S3CRC_ADDR_TXTLEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1895:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuf, buf+S3CRC_LEN_TXTOFFSET, S3CRC_LEN_TXTLEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1900:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuf, buf+S3CRC_DOWRITE_TXTOFFSET, S3CRC_DOWRITE_TXTLEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1916:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuf, buf+S3INFO_LEN_TXTOFFSET, S3INFO_LEN_TXTLEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1921:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuf, buf+S3INFO_TYPE_TXTOFFSET, S3INFO_TYPE_TXTLEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1928:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( tmpbuf, buf+S3INFO_DATA_TXTOFFSET+(i*4), 4); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1958:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpbuf, buf+S3DATA_TXTOFFSET+(i*2), 2); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:2241:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname[80]; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:2247:1: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fname, "d%06lx.dat", fchunk[i].addr); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:2248:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen( fname, "w"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:2261:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fwritemsg.data.data, data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:2270:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rwritemsg.data.data, data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x.c:3126:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(txdesc.frame_control), p80211_hdr, sizeof(p80211_hdr_t)); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x.c:3618:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(datap, &rxdesc.frame_control, WLAN_HDR_A3_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x.c:3623:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(datap, &rxdesc.address4, WLAN_HDR_A3_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x.c:3828:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( datap, &(rxdesc->frame_control), hdrlen); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x_usb.c:912:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(complete->riddata, data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x_usb.c:964:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(complete->data, complete->rmemresp->data, complete->len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x_usb.c:2037:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctlx->outbuf.wridreq.data, riddata, riddatalen); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x_usb.c:2237:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctlx->outbuf.wmemreq.data, data, len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x_usb.c:3479:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(hw->txbuff.txfrm.desc.frame_control), p80211_hdr, sizeof(p80211_hdr_t)); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x_usb.c:3495:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, p80211_wep->iv, sizeof(p80211_wep->iv)); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x_usb.c:3497:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, p80211_wep->data, skb->len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x_usb.c:3499:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, skb->data, skb->len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x_usb.c:3506:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, p80211_wep->icv, sizeof(p80211_wep->icv)); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x_usb.c:4478:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( datap, &(rxdesc->frame_control), hdrlen); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/hfa384x_usb.c:4484:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(datap, rxfrm->data, datalen); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2_cs.c:1163:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (link->open) { data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mgmt.c:308:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(scanreq.ssid.data, msg->ssid.data.data, msg->ssid.data.len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mgmt.c:517:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(req->bssid.data.data, item->bssid, WLAN_BSSID_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mgmt.c:522:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(req->ssid.data.data, item->ssid.data, req->ssid.data.len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mgmt.c:825:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( joinreq.bssid, ((unsigned char *) &msg->bssid.data) + 1, WLAN_BSSID_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mgmt.c:1211:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&wlandev->ssid, &msg->ssid.data, sizeof(msg->ssid.data)); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mgmt.c:1536:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( wlandev->bssid, wlandev->netdev->dev_addr, WLAN_BSSID_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mgmt.c:1610:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( wlandev->bssid, wlandev->netdev->dev_addr, WLAN_BSSID_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mgmt.c:2639:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&wlandev->ssid, &msg->ssid.data, sizeof(msg->ssid.data)); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2005:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pstr->data, &wordbuf[1], pstr->len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2427:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bytebuf, hw->dot11_grp_addr[0], len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2506:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pstr->data, fwid.primary, pstr->len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2510:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pstr->data, fwid.secondary, pstr->len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2724:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data, &wlandev->rx, sizeof(wlandev->rx)); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2725:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(test, &wlandev->rx, sizeof(wlandev->rx)); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2759:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data, data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2762:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(test, data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2783:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(macarray->data[macarray->cnt], old.addr[i], WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2800:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(macarray->data[macarray->cnt], old.addr[i], WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2819:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pstr->data, hw->comment, pstr->len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2825:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hw->comment, pstr->data, cnt); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2844:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(macarray->data, hw->allow.addr, data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2856:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(macarray->data, hw->deny.addr, data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2903:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pstr->data, wpa.data, pstr->len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2906:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(wpa.data, pstr->data, pstr->len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2963:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(list, &hw->authlist, sizeof(prism2sta_authlist_t)); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2964:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&test, &hw->authlist, sizeof(prism2sta_authlist_t)); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:3108:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hw->allow.addr, macarray->data, macarray->cnt*WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:3113:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hw->allow.addr1, macarray->data, macarray->cnt*WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:3194:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hw->deny.addr, macarray->data, macarray->cnt*WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:3199:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hw->deny.addr1, macarray->data, macarray->cnt*WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:3280:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bytestr->data, pstr->data, pstr->len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:3304:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bytearea, pstr->data, pstr->len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:3329:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pstr->data, bytestr->data, pstr->len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:3354:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pstr->data, bytearea, len); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:3594:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pstr->data, hw->dot11_grp_addr[index], data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:3641:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hw->dot11_grp_addr[hw->dot11_grpcnt], pstr->data, data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2sta.c:846:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pstr[(HFA384x_RID_NICSERIALNUMBER_LEN * 4) + 1]; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2sta.c:1331:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( joinreq.bssid, sr->result[0].bssid, WLAN_BSSID_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2sta.c:1377:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hw->scanresults, inf, sizeof(hfa384x_InfFrame_t)); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2sta.c:1416:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&inf->info.chinforesult, &hw->channel_info.results, sizeof(hfa384x_ChInfoResult_t)); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2sta.c:1824:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(skb->data, inf, sizeof(*inf)); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2sta.c:1848:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rec.address, inf->info.authreq.sta_addr, WLAN_ADDR_LEN); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2sta.c:1960:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(hw->authlist.addr[hw->authlist.cnt], data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2sta.c:2394:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, "# nic h/w: id=0x%02x %d.%d.%d\n", data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2sta.c:2398:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, "# pri f/w: id=0x%02x %d.%d.%d\n", data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2sta.c:2403:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, "# sta f/w: id=0x%02x %d.%d.%d\n", data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2sta.c:2407:8: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, "# ap f/w: id=0x%02x %d.%d.%d\n", data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2sta.c:2413:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, "# initial nic hw type, needed for SSF ramdl\n"); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2sta.c:2414:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. p += sprintf(p, "initnichw=%04x\n", hwtype); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkmiblist.c:63:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[BUFF_LEN + 2]; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkmiblist.c:64:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[BUFF_LEN + 2]; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkmiblist.c:65:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ofname1[BUFF_LEN + 2]; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkmiblist.c:80:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( (data_fptr = fopen(ifname, "r")) == NULL ) { data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkmiblist.c:85:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( (txt_fptr = fopen(ofname1, "w")) == NULL ) { data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:65:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[BUFF_LEN + 2]; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[BUFF_LEN + 2]; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:67:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ofname1[BUFF_LEN + 2]; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ofname2[BUFF_LEN + 2]; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:84:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( (data_fptr = fopen(ifname, "r")) == NULL ) { data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:89:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( (html_fptr = fopen(ofname1, "w")) == NULL ) { data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:95:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( (txt_fptr = fopen(ofname2, "w")) == NULL ) { data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:260:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:267:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:454:6: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( &textbuf[strlen(textbuf)], data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:465:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:472:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:675:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:682:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:859:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:872:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:879:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1040:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1076:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1085:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1092:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1135:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1171:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1180:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1187:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1550:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *buf, error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1764:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *buf, error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1796:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. buf += sprintf(buf, "%u,", (UINT32) i); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:1962:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:283:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[100], value[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:405:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:500:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pair[500], *ch; data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:955:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpstr[MSG_BUFF_LEN]; data/linux-wlan-ng-0.2.9+dfsg/src/wlanctl/help.c:278:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char access_type[8]; data/linux-wlan-ng-0.2.9+dfsg/src/wlanctl/help.c:282:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(access_type,"-w" ); data/linux-wlan-ng-0.2.9+dfsg/src/wlanctl/help.c:285:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(access_type,"r-" ); data/linux-wlan-ng-0.2.9+dfsg/src/wlanctl/help.c:288:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(access_type,"rw" ); data/linux-wlan-ng-0.2.9+dfsg/src/wlanctl/help.c:291:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(access_type,"--" ); data/linux-wlan-ng-0.2.9+dfsg/src/wlanctl/wlanctl.c:409:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(msgptr, tmpitem, itemlen); data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/wlan_compat.h:751:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define wlan_mkprintstr(buf, buflen, str, strlen) \ data/linux-wlan-ng-0.2.9+dfsg/src/include/wlan/wlan_compat.h:755:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memset(str, 0, (strlen)); \ data/linux-wlan-ng-0.2.9+dfsg/src/nwepgen/nwepgen.c:138:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(genstr); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:459:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(rfname[opt_ramloadcnt], optarg, FILENAME_MAX); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:468:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ffname[opt_flashloadcnt], optarg, FILENAME_MAX); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:477:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(addpdrfname[opt_addpdrcnt], optarg, FILENAME_MAX); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:487:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(newpdafname, optarg, FILENAME_MAX); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:510:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( sernum, optarg, SERNUM_LEN_MAX); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:537:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( devname, argv[optind], sizeof(devname) ); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1445:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(dest, src, s3plug[i].len - 1); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/download/prism2dl.c:1858:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmprec.checksum = strtoul( buf+strlen(buf)-2, NULL, 16); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2505:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pstr->len = strlen(fwid.primary); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2509:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pstr->len = strlen(fwid.secondary); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/driver/prism2mib.c:2818:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pstr->len = strlen(hw->comment); data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkmiblist.c:115:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( buff[strlen(buff) - 1] == '\n' ) { data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkmiblist.c:116:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buff[strlen(buff) - 1] = '\0'; data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:196:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cptr) != 0 ) { data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:206:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cptr) != 0 ) { data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:216:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cptr) != 0 ) { data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:226:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cptr) != 0 ) { data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:236:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cptr) != 0 ) { data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:246:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cptr) != 0 ) { data/linux-wlan-ng-0.2.9+dfsg/src/prism2/ridlist/mkridlist.c:269:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cptr) != 0 ) { data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:253:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat( textbuf, pstr->data, pstr->len); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:254:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat( textbuf, "\'", 1); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:332:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(textbuf); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:341:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( pstr->data, textbuf, len); data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:454:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf( &textbuf[strlen(textbuf)], data/linux-wlan-ng-0.2.9+dfsg/src/shared/p80211types.c:459:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). textbuf[strlen(textbuf) - 1] = '\0'; data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:309:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(req.name, device, sizeof(req.name)); data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:334:15: [1] (buffer) scanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. cnt = scanf("%99s", name); /* sizeof(name)-1 = 99 */ data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:429:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(req.name, device, sizeof(req.name)); data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:524:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(req.name, device, sizeof(req.name)); data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:550:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(pair) >= sizeof(pair)-1) data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:606:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(mib->name); data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:964:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(msg->devname, device, WLAN_DEVNAMELEN_MAX - 1); data/linux-wlan-ng-0.2.9+dfsg/src/wlancfg/wlancfg.c:1100:41: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (strchr(value, '=') == NULL) strcat(value, "="); data/linux-wlan-ng-0.2.9+dfsg/src/wlanctl/wlanctl.c:309:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(((p80211msg_t *)msg)->devname, devname, data/linux-wlan-ng-0.2.9+dfsg/src/wlanctl/wlanctl.c:395:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(alist[i].name)) == 0 ) { ANALYSIS SUMMARY: Hits = 418 Lines analyzed = 52091 in approximately 1.38 seconds (37879 lines/second) Physical Source Lines of Code (SLOC) = 33446 Hits@level = [0] 370 [1] 39 [2] 246 [3] 4 [4] 129 [5] 0 Hits@level+ = [0+] 788 [1+] 418 [2+] 379 [3+] 133 [4+] 129 [5+] 0 Hits/KSLOC@level+ = [0+] 23.5604 [1+] 12.4978 [2+] 11.3317 [3+] 3.97656 [4+] 3.85696 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.