Next Classic Unix Security Problems 26

Buffer overflow

        char *gets(char *) {
          fprintf(stderr, "gets is unsafe.  Don't use it.\n");
          exit(1);
        }

3. Better understanding of buffer overflow conditions and risks

4. Better programming languages with run-time bounds checking

5. Network daemons should not run as root


Next Copyright © 2005 M. J. Dominus