(#4) Web Security Tip: Buffer overflows

The authors of this tip provide some tests to see if your system is susceptible to a buffer overflow.



This Web Security Tip on buffer overflows received a user-rating of 4.71. Do you have a tip of your own on a particular security vulnerability? Submit it to searchSecurity.

Buffer-overflow vulnerabilities are back in the news. Buffer overflows, as this tip from InformIT explains, usually target poorly constructed C/C++ code. Elfriede Dustin, Douglas McDiarmid and Jeff Rashka, the writers of this article, provide some tests to see if your system is susceptible to a buffer overflow.

Read the rest of this tip.


For more information on this topic, visit these other searchSecurity resources:
Best Web Links: Common vulnerabilities and prevention tips
Ask the Expert: Buffer overflow exploits

Dig deeper on Security Resources

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close