The developer - or customers - may wish to restrict or eliminate use of a function, library, or third party component for any number of reasons, including real or suspected vulnerabilities; difficulty to use securely; export controls or license requirements; obsolete or poorly-maintained code; internal code being scheduled for deprecation; etc.
To reduce risk of vulnerabilities, the developer might maintain a list of "banned" functions that programmers must avoid using because the functions are difficult or impossible to use securely. This issue can also make the product more costly and difficult to maintain.
Portée | Impact | Probabilité |
---|---|---|
Other | Reduce Maintainability |
Références | Description |
---|---|
CVE-2007-1470 | Library has multiple buffer overflows using sprintf() and strcpy() |
CVE-2007-4004 | FTP client uses inherently insecure gets() function and is setuid root on some systems, allowing buffer overflow |
Nom | Organisation | Date | Date de publication | Version |
---|---|---|---|---|
CWE Content Team | MITRE | 3.2 |
Nom | Organisation | Date | Commentaire |
---|---|---|---|
CWE Content Team | MITRE | updated References, Relationships | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated References, Relationships, Time_of_Introduction | |
CWE Content Team | MITRE | updated Mapping_Notes | |
CWE Content Team | MITRE | updated Demonstrative_Examples, Observed_Examples |