[WEB SECURITY] Jeremiah Grossman writes about buffer overflow myths

Davidson, Michelle MDavidson at techtarget.com
Tue Mar 14 08:45:55 EST 2006


 

 

 

Jeremiah Grossman has written a column for SearchAppSecurity.com on the
realities of buffer overflows. Take a look:

 

 

Myth-busting Web application buffer overflows

http://searchappsecurity.techtarget.com/tip/1,289483,sid92_gci1172478,00
.html

 

If someone managed to exploit a buffer overflow in a Web application, it
would result in a critical situation. But the chance of that happening
to a custom Web application is slim. Focus instead on cross-site
scripting and SQL injection vulnerabilities,
authentication/authorization loopholes, and business logic flaws.

 

 

 

 

Michelle Davidson

Editor

SearchAppSecurity.com

TechTarget

 

4025 Sea Grape Circle

Delray Beach, FL  33445

 

Phone: 561-302-1120

Fax: 561-496-1860

AIM: MicheDav910

 

TechTarget 
The Most Targeted IT Media 
www.techtarget.com <http://www.techtarget.com/>  

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/attachments/20060314/470c7406/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.gif
Type: image/gif
Size: 2673 bytes
Desc: image001.gif
URL: <http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/attachments/20060314/470c7406/attachment.gif>


More information about the websecurity mailing list