Learning the basics of buffer overflows
Source: IBM Developerworks - Posted by LinuxSecurity.com Team   
Host Security "Buffer overflows accounted for over 50 percent of all major security bugs leading to CERT/CC advisories last year. ... So why are buffer overflow vulnerabilities still being produced? Because the recipe for disaster is surprisingly simple. Take one part bad . . . "Buffer overflows accounted for over 50 percent of all major security bugs leading to CERT/CC advisories last year. ... So why are buffer overflow vulnerabilities still being produced? Because the recipe for disaster is surprisingly simple. Take one part bad language design (usually in C and C++), mix in two parts poor programmer practice, and you have a recipe for big problems." [Found on linuxtoday]

Read this full article at IBM Developerworks

Only registered users can write comments.
Please login or register.

Powered by AkoComment!