This is particularly dangerous because there is no checking of the source’s size before it is copied over to the destination. In reality, we are talking about overwriting memory locations here, something which will be explained later in this chapter. Suffice it to say, when the source is larger than the space allocated for the destination, bad things happen (buffer overflows).
- Chapter 2 Programming Survival Skills
- from Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition, 4th Edition
- Publisher: McGraw-Hill Osborne Media
- Released: January 2015
Share this highlighthttp://www.safaribooksonline.com/a/gray-hat-hacking/319628/