This preview shows page 1. Sign up to view the full content.
Unformatted text preview: Buy insurance for her paintings 3a. Target1 The function foo() uses strcpy() to copy a supplied string(char *arg) without bounds checking. This is vulnerable to buffer overflow. This can be fixed by using strncpy() instead of strcpy(), which does a bounds check before copying. Target2 The function foo() takes in two parameters, the supplied string and the length of the string. This is vulnerable to buffer overflow. Primetarget...
View Full Document
This note was uploaded on 01/31/2010 for the course UNKNOWN a taught by Professor A during the Spring '10 term at A.T. Still University.
- Spring '10