CWE

Common Weakness Enumeration

A Community-Developed List of Software Weakness Types

CWE/SANS Top 25 Most Dangerous Software Errors
Home > CWE List > CWE- Individual Dictionary Definition (3.1)  
ID

CWE CATEGORY: CERT C Secure Coding (2008 Version) Section 06 - Arrays (ARR)

Category ID: 740
Status: Incomplete
+ Summary
Weaknesses in this category are related to rules in the arrays section of the CERT C Secure Coding Standard, as published in 2008. Since not all rules map to specific weaknesses, this category may be incomplete.
+ Membership
NatureTypeIDName
MemberOfViewView - a subset of CWE entries that provides a way of examining CWE content. The two main view structures are Slices (flat lists) and Graphs (containing relationships between entries).734Weaknesses Addressed by the CERT C Secure Coding Standard (2008 Version)
HasMemberClassClass - a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More general than a Base weakness.119Improper Restriction of Operations within the Bounds of a Memory Buffer
HasMemberBaseBase - a weakness that is described in an abstract fashion, but with sufficient details to infer specific methods for detection and prevention. More general than a Variant weakness, but more specific than a Class weakness.129Improper Validation of Array Index
HasMemberVariantVariant - a weakness that is described at a very low level of detail, typically limited to a specific language or technology. More specific than a Base weakness.467Use of sizeof() on a Pointer Type
HasMemberBaseBase - a weakness that is described in an abstract fashion, but with sufficient details to infer specific methods for detection and prevention. More general than a Variant weakness, but more specific than a Class weakness.469Use of Pointer Subtraction to Determine Size
HasMemberClassClass - a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More general than a Base weakness.665Improper Initialization
HasMemberBaseBase - a weakness that is described in an abstract fashion, but with sufficient details to infer specific methods for detection and prevention. More general than a Variant weakness, but more specific than a Class weakness.805Buffer Access with Incorrect Length Value
+ Notes

Relationship

In the 2008 version of the CERT C Secure Coding standard, the following rules were mapped to the following CWE IDs:

  • CWE-119 ARR00-C Understand how arrays work
  • CWE-119 ARR33-C Guarantee that copies are made into storage of sufficient size
  • CWE-119 ARR34-C Ensure that array types in expressions are compatible
  • CWE-119 ARR35-C Do not allow loops to iterate beyond the end of an array
  • CWE-129 ARR00-C Understand how arrays work
  • CWE-129 ARR30-C Guarantee that array indices are within the valid range
  • CWE-129 ARR38-C Do not add or subtract an integer to a pointer if the resulting value does not refer to a valid array element
  • CWE-467 ARR01-C Do not apply the sizeof operator to a pointer when taking the size of an array
  • CWE-469 ARR36-C Do not subtract or compare two pointers that do not refer to the same array
  • CWE-469 ARR37-C Do not add or subtract an integer to a pointer to a non-array object
  • CWE-665 ARR02-C Explicitly specify array bounds, even if implicitly defined by an initializer
  • CWE-805 ARR33-C Guarantee that copies are made into storage of sufficient size
+ Content History
Submissions
Submission DateSubmitterOrganization
2008-11-24CWE Content TeamMITRE
Modifications
Modification DateModifierOrganization
2011-09-13CWE Content TeamMITRE
updated Relationships
2017-11-08CWE Content TeamMITRE
updated Description, Name, Relationship_Notes
Previous Entry Names
Change DatePrevious Entry Name
2017-11-08CERT C Secure Coding Section 06 - Arrays (ARR)

More information is available — Please select a different filter.
Page Last Updated: March 29, 2018