Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

Is the code susceptible to buffer overruns?

0
10 Posted

Is the code susceptible to buffer overruns?

0
10

Buffer overruns are a vulnerability that may lead to execution of arbitrary code. While tracing through unmanaged or unsafe code, make sure that the following rules are followed: • Make sure any functions that copy variable-length data into a buffer and use a maximum length parameter properly. • Make sure that the code does not rely on another layer or tier for data truncation. • If you see a problem, make sure the code truncates the data instead of expanding the buffer to fit it. Buffer expansion may just move the problem downstream. • Make sure any unmanaged code was compiled with the /GS option. The application should not contain code similar to the following example.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123