Security Basics mailing list archives

RE: Any reason not to use strcpy, strcat or scanf?


From: "webb wang RR" <webbwang () tampabay rr com>
Date: Tue, 13 Jul 2004 22:09:57 -0700

Most of the known buffer over flow attack techniques are based on the
weakness in memory related function calls, such as strcpy, strcat, memcpy,
memcat, etc...  So be careful when you use them and always put extra
pre-caution to make sure no memory copies or moves get beyond the alloted
memory boundries. 

A nice intro can be found here:
http://www.subterrain.net/overflow-papers/overflow_tutorial.txt


Webb

CyberShield Networks, Inc.
Intelligent Security for a Changing World
www.cybershieldnetworks.com



-----Original Message-----
From: A.V. [mailto:pahalial.lists () gmail com] 
Sent: Wednesday, July 14, 2004 4:00 AM
To: Secbasics
Subject: Any reason not to use strcpy, strcat or scanf?

Hi,

I was simply wondering after seeing the "blackhat audit" program sent to F-D
whether there was actually any reason not to use these functions
(strcpy/strcat/scanf) in your code. I mean, I understand why you shouldn't
use scanf to i.e. process user input, but other than that? Some kind of
unexpected behaviour or something?

Thanks,
A.V.

---------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off
any course! All of our class sizes are guaranteed to be 10 students or less
to facilitate one-on-one interaction with one of our expert instructors. 
Attend a course taught by an expert instructor with years of in-the-field
pen testing experience in our state of the art hacking lab. Master the
skills of an Ethical Hacker to better assess the security of your
organization. 
Visit us at: 
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------




---------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off 
any course! All of our class sizes are guaranteed to be 10 students or less 
to facilitate one-on-one interaction with one of our expert instructors. 
Attend a course taught by an expert instructor with years of in-the-field 
pen testing experience in our state of the art hacking lab. Master the skills 
of an Ethical Hacker to better assess the security of your organization. 
Visit us at: 
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------


Current thread: