[CURRENT] Buffer Overflow - TairinySimeonato/WebAuditing GitHub Wiki

Description

  • Buffers are areas of memory that hold data. Buffer overflows happens when data overruns the buffer boundary and overwrites adjacent memory locations. If the adjacent memory location stores executable code, an attacker may send a malicious code input and have their code executed instead of the intended one.
  • This vulnerability has a very high severity impact, since it can can corrupt data, crash the program, or execute malicious code.
  • C and C++ are languages often associated with buffer overflows.
  • Although it is rare for web-developers to write code in C or C++, Apache HTTP Server, IIS and Nginx servers have been found to be vulnerable to buffer overflows.

Prevention

  • If possible, use Python, Java or .NET languages
  • Implement secure functions

  • Deploy security patches as soon as they become available

Code Review

Testing

References