Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- struct targets{
- char ip[MAX_ASCII_ADDR_LEN];
- u_char mac[MAX_ASCII_ADDR_LEN];
- char extension[64];
- char dirname[64];
- char protocol[11];
- char ua[48];
- char misc[64];
- };
- void sip_targetlookup(sipDB* currentSipCall)
- {
- ...
- memcpy(targettab[targetcount].protocol,
- "sip",
- sizeof(targettab[targetcount].protocol));
- ...
- }
- This suspicious code was found in UCSniff project by PVS-Studio static code analyzer.
- Warning message is:
- V512 A call of the 'memcpy' function will lead to the '"sip"' buffer becoming out of range. targets.c 566
- PVS-Studio is a static analyzer for detecting bugs in the source code of applications written in C, C++, C++11, C++/CX. Site: http://www.viva64.com/en/pvs-studio/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement