Article

(#4) Web Security Tip: Buffer overflows

Elfriede Dustin, Douglas McDiarmid & Jeff Rashka


This Web Security Tip on buffer overflows received a user-rating of 4.71. Do you have a tip of your own on a particular security vulnerability? Submit it to searchSecurity.

Buffer-overflow vulnerabilities

    Requires Free Membership to View

are back in the news. Buffer overflows, as this tip from InformIT explains, usually target poorly constructed C/C++ code. Elfriede Dustin, Douglas McDiarmid and Jeff Rashka, the writers of this article, provide some tests to see if your system is susceptible to a buffer overflow.

Read the rest of this tip.


For more information on this topic, visit these other searchSecurity resources:
Best Web Links: Common vulnerabilities and prevention tips
Ask the Expert: Buffer overflow exploits

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: