ARR-inv-index
Synopsis
An array access is out of bounds.
Enabled by default
Yes
Severity/Certainty
High/High

Full description
An element of an array is accessed when that element is outside the bounds of the array. This might corrupt data and/or crash the application, and result in security vulnerabilities. This check is identical to MISRAC++2008-5-0-16_c, MISRAC2012-Rule-18.1_a, CERT-ARR30-C_a.
Coding standards
- CERT ARR30-C
Do not form or use out of bounds pointers or array subscripts
- CWE 119
Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE 120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
- CWE 121
Stack-based Buffer Overflow
- CWE 124
Buffer Underwrite ('Buffer Underflow')
- CWE 126
Buffer Over-read
- CWE 127
Buffer Under-read
- CWE 129
Improper Validation of Array Index
- MISRA C:2012 Rule-18.1
(Required) A pointer resulting from arithmetic on a pointer operand shall address an element of the same array as that pointer operand
- MISRA C++ 2008 5-0-16
(Required) A pointer operand and any pointer resulting from pointer arithmetic using that operand shall both address elements of the same array.
Code examples
The following code example fails the check and will give a warning:
int main(void)
{
int a[4];
a[7] = 0; //7 is out of bounds, since
//a only has an interval of [0,3]
return 0;
}
The following code example passes the check and will not give a warning about this issue:
int main(void)
{
int a[4];
a[3] = 0;
return 0;
}