[CURRENT] Buffer Overflow - TairinySimeonato/WebAuditing GitHub Wiki
Description
Buffers are areas of memory that hold data. Buffer overflows happens when data overruns the buffer boundary and overwrites adjacent memory locations. If the adjacent memory location stores executable code, an attacker may send a malicious code input and have their code executed instead of the intended one.
This vulnerability has a very high severity impact, since it can can corrupt data, crash the program, or execute malicious code.
C and C++ are languages often associated with buffer overflows.
Although it is rare for web-developers to write code in C or C++, Apache HTTP Server, IIS and Nginx servers have been found to be vulnerable to buffer overflows.
Prevention
If possible, use Python, Java or .NET languages
Implement secure functions
Deploy security patches as soon as they become available