Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c Examining data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c Examining data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.h Examining data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/php_oauth.h Examining data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c Examining data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c Examining data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.h Examining data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/php_oauth.h FINAL RESULTS: data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:330:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. result = php_base64_encode((unsigned char *)Z_STRVAL_P(args[1]), Z_STRLEN_P(args[1]), &retlen); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:1123:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(z_data, data, data_len); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:3009:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&so_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/php_oauth.h:252:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char last_location_header[OAUTH_MAX_HEADER_LEN]; data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:306:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb->fcall_info, &fci, sizeof(zend_fcall_info)); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:681:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char additional_info[512] = "", *http_verb = NULL, *uri = NULL, *sbs = NULL, *signature = NULL, *current_uri = NULL; data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:952:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(strong?"/dev/random":"/dev/urandom", O_RDONLY); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:1259:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&oauth_provider_obj_hndlrs, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.h:99:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *endpoint_paths[3]; data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:255:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. result = php_base64_encode((unsigned char *) Z_STRVAL_P(Z_REFVAL(args[1])), Z_STRLEN_P(Z_REFVAL(args[1]))); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:971:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(z_data, data, data_len); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:2733:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&so_object_handlers, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/php_oauth.h:218:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char last_location_header[OAUTH_MAX_HEADER_LEN]; data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:301:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cb->fcall_info, &fci, sizeof(zend_fcall_info)); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:666:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char additional_info[512] = "", *http_verb = NULL, *uri = NULL, *current_uri = NULL; data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:940:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(strong?"/dev/random":"/dev/urandom", O_RDONLY); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:1189:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&oauth_provider_obj_hndlrs, zend_get_std_object_handlers(), sizeof(zend_object_handlers)); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.h:93:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *endpoint_paths[3]; data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:56:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). php_url_decode(var, strlen(var)); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:57:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val_len = php_url_decode(val, strlen(val)); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:62:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). php_url_decode(var, strlen(var)); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:390:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). prop_len = strlen(prop_name); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:406:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). prop_len = strlen(prop_name); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:420:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). url_len = strlen(url); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:674:120: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (PG(http_globals)[TRACK_VARS_GET] && SUCCESS==zend_hash_find(HASH_OF(PG(http_globals)[TRACK_VARS_GET]), arg_name, strlen(arg_name)+1, (void*)&ptr) && IS_STRING==Z_TYPE_PP(ptr)) || data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:675:122: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (PG(http_globals)[TRACK_VARS_POST] && SUCCESS==zend_hash_find(HASH_OF(PG(http_globals)[TRACK_VARS_POST]), arg_name, strlen(arg_name)+1, (void*)&ptr) && IS_STRING==Z_TYPE_PP(ptr)) data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:698:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). urlparts = php_url_parse_ex(uri, strlen(uri)); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:834:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). h = zend_hash_func((char *)arg, strlen(arg)+1); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:835:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zend_hash_quick_update(ht, (char *)arg, strlen(arg)+1, h, &varg, sizeof(zval *), NULL); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:1179:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(soo->last_location_header, header + vpos, eol - vpos); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:1279:79: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((type = php_memnstr(postval, ";type=", sizeof(";type=") - 1, postval + strlen(soo->multipart_files[i]) - 1))) { data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:1282:91: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((filename = php_memnstr(postval, ";filename=", sizeof(";filename=") - 1, postval + strlen(soo->multipart_files[i]) - 1))) { data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:1297:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CURLFORM_NAMELENGTH, (long)strlen(soo->multipart_params[i]), data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:1305:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CURLFORM_NAMELENGTH, (long)strlen(soo->multipart_params[i]), data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:1307:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CURLFORM_CONTENTSLENGTH, (long)strlen(postval), data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/oauth.c:2747:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hlen = strlen(hkey)+1; data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:28:73: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zend_update_property(Z_OBJCE_P(provider_obj), provider_obj, prop_name, strlen(prop_name), prop TSRMLS_CC); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:49:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(zend_hash_add(ht, required_params[idx], strlen(required_params[idx]) + 1, &tmp, sizeof(zval *), NULL)==FAILURE) { data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:67:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(zend_hash_find(ht, required_param, strlen(required_param) + 1, (void **)&dest_entry)==FAILURE) { data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:88:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(zend_hash_find(ht, required_param, strlen(required_param) + 1, (void **)&dest_entry)==FAILURE) { data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:91:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(zend_hash_add(ht, required_param, strlen(required_param) + 1, &zparam, sizeof(zval *), NULL)==FAILURE) { data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:137:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). php_url *urlparts = php_url_parse_ex(uri, strlen(uri)); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:138:73: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uri_matched = urlparts && 0==strncmp(urlparts->path, reqtoken_path, strlen(reqtoken_path)); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:142:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uri_matched = 0==strncmp(uri, reqtoken_path, strlen(reqtoken_path)); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:206:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key_len = strlen(key); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:237:3: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(auth_header), data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:958:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). n = read(fd, iv + reaped, size - reaped); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:1043:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pr_len = Z_STRLEN_P(sbs) + strlen(out) + sizeof("&debug_sbs="); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:1062:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pr_len = Z_STRLEN_P(missing_params) + strlen(out) + sizeof("&oauth_parameters_absent="); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:1077:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ZVAL_STRINGL(return_value, out, strlen(out), 1); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.c:1087:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ctr.line_len = strlen(http_header_line); data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.h:62:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(!strncasecmp(param, exp, strlen(exp))) { \ data/php-oauth-2.0.5+1.2.3/oauth-1.2.3/provider.h:73:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zend_hash_update(ht, k, strlen(k) + 1, (void**)v, Z_STRLEN_PP(v) + 1, NULL) data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:66:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). php_url_decode(var, strlen(var)); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:67:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). val_len = php_url_decode(val, strlen(val)); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:72:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). php_url_decode(var, strlen(var)); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:311:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return zend_hash_str_find(soo->properties, prop_name, strlen(prop_name)); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:318:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (zend_hash_str_update(soo->properties, prop_name, strlen(prop_name), prop) == NULL) ? FAILURE : SUCCESS; data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:329:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). url_len = strlen(url); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:551:145: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (Z_TYPE(PG(http_globals)[TRACK_VARS_GET]) != IS_UNDEF && (ptr = zend_hash_str_find(HASH_OF(&(PG(http_globals)[TRACK_VARS_GET])), arg_name, strlen(arg_name))) != NULL && IS_STRING == Z_TYPE_P(ptr)) || data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:552:146: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (Z_TYPE(PG(http_globals)[TRACK_VARS_POST])!= IS_UNDEF && (ptr = zend_hash_str_find(HASH_OF(&(PG(http_globals)[TRACK_VARS_POST])), arg_name, strlen(arg_name))) != NULL && IS_STRING == Z_TYPE_P(ptr)) data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:577:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). urlparts = php_url_parse_ex(uri, strlen(uri)); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:706:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zend_hash_str_update(ht, (char *)arg, strlen(arg), &varg); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:1027:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(soo->last_location_header, header + vpos, eol - vpos); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:1103:88: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((type = (char *) php_memnstr(postval, ";type=", sizeof(";type=") - 1, postval + strlen(soo->multipart_files[i]) - 1))) { data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:1106:100: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((filename = (char *) php_memnstr(postval, ";filename=", sizeof(";filename=") - 1, postval + strlen(soo->multipart_files[i]) - 1))) { data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:1121:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CURLFORM_NAMELENGTH, (long)strlen(soo->multipart_params[i]), data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:1129:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CURLFORM_NAMELENGTH, (long)strlen(soo->multipart_params[i]), data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/oauth.c:1131:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CURLFORM_CONTENTSLENGTH, (long)strlen(postval), data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/php_oauth.h:337:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define OAUTH_URL_LEN(a) strlen(a) data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:27:73: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zend_update_property(Z_OBJCE_P(provider_obj), provider_obj, prop_name, strlen(prop_name), prop); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:47:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(zend_hash_str_add(ht, required_params[idx], strlen(required_params[idx]), &tmp) == NULL) { data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:64:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((dest_entry = zend_hash_str_find(ht, required_param, strlen(required_param))) == NULL) { data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:85:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if((dest_entry = zend_hash_str_find(ht, required_param, strlen(required_param))) == NULL) { data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:87:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(zend_hash_str_add(ht, required_param, strlen(required_param), &zparam) == NULL) { data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:133:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). php_url *urlparts = php_url_parse_ex(uri, strlen(uri)); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:134:88: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uri_matched = urlparts && 0==strncmp(OAUTH_URL_STR(urlparts->path), reqtoken_path, strlen(reqtoken_path)); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:138:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). uri_matched = 0==strncmp(uri, reqtoken_path, strlen(reqtoken_path)); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:198:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return zend_hash_str_update(ht, key, strlen(key), val) != NULL; data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:209:61: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zend_string *s_auth_header = zend_string_init(auth_header, strlen(auth_header), 0); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:234:3: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(auth_header), data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:946:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). n = read(fd, iv + reaped, size - reaped); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:1027:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pr_len = Z_STRLEN_P(sbs) + strlen(out) + sizeof("&debug_sbs="); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:1046:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pr_len = Z_STRLEN_P(missing_params) + strlen(out) + sizeof("&oauth_parameters_absent="); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:1061:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ZVAL_STRINGL(return_value, out, strlen(out)); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.c:1071:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ctr.line_len = strlen(http_header_line); data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.h:57:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(!strncasecmp(param, exp, strlen(exp))) { \ data/php-oauth-2.0.5+1.2.3/oauth-2.0.5/provider.h:68:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zend_hash_update(ht, k, strlen(k) + 1, (void**)v, Z_STRLEN_PP(v) + 1, NULL) ANALYSIS SUMMARY: Hits = 88 Lines analyzed = 9512 in approximately 0.26 seconds (36396 lines/second) Physical Source Lines of Code (SLOC) = 7216 Hits@level = [0] 8 [1] 70 [2] 18 [3] 0 [4] 0 [5] 0 Hits@level+ = [0+] 96 [1+] 88 [2+] 18 [3+] 0 [4+] 0 [5+] 0 Hits/KSLOC@level+ = [0+] 13.3038 [1+] 12.1951 [2+] 2.49446 [3+] 0 [4+] 0 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.