Difference between revisions of "Testing for Buffer Overflow (OWASP-DV-014)"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
{{Template:OWASP Testing Guide v3}}
 
{{Template:OWASP Testing Guide v3}}
 +
 +
==Related Security Activities==
 +
 +
===Description of Buffer Overflow===
 +
 +
See the OWASP article on [[Buffer_overflow_attack|Buffer Overflow]] Attacks.
 +
 +
See the OWASP article on [[Buffer_Overflow|Buffer Overflow]] Vulnerabilities.
 +
 +
===How to Avoid Buffer Overflow Vulnerabilities===
 +
 +
See the [[:Category:OWASP Guide Project|OWASP Development Guide]] article on how to [[Buffer_Overflows|Avoid Buffer Overflow]] Vulnerabilities.
 +
 +
===How to Review Code for Buffer Overflow Vulnerabilities===
 +
 +
See the [[:Category:OWASP Code Review Project|OWASP Code Review Guide]] article on how to [[Reviewing_Code_for_Buffer_Overruns_and_Overflows|Review Code for Buffer Overruns and Overflows]] Vulnerabilities.
 +
  
 
'''What's buffer overflow?'''
 
'''What's buffer overflow?'''

Revision as of 17:15, 20 September 2008

OWASP Testing Guide v3 Table of Contents

This article is part of the OWASP Testing Guide v3. The entire OWASP Testing Guide v3 can be downloaded here.

OWASP at the moment is working at the OWASP Testing Guide v4: you can browse the Guide here

Contents


Related Security Activities

Description of Buffer Overflow

See the OWASP article on Buffer Overflow Attacks.

See the OWASP article on Buffer Overflow Vulnerabilities.

How to Avoid Buffer Overflow Vulnerabilities

See the OWASP Development Guide article on how to Avoid Buffer Overflow Vulnerabilities.

How to Review Code for Buffer Overflow Vulnerabilities

See the OWASP Code Review Guide article on how to Review Code for Buffer Overruns and Overflows Vulnerabilities.


What's buffer overflow?

To find out more about buffer overflow vulnerabilities, please go to Buffer Overflow pages.

How to test for buffer overflow vulnerabilities?

Different types of buffer overflow vulnerabilities have different testing methods. Here are the testing methods for the common types of buffer overflow vulnerabilities.