Wednesday, October 11, 2006

Vulnerability Type Distributions in CVE

"If 'smashing the stack'-style buffer overflows were the first wave of serious exploitable problems, and heap overflows were the second wave, integer overflows are the third wave," says Thomas Ptacek, a researcher with Matasano Security. "Developers have gotten more careful about the first two problems, so auditors moved on."... Numbers can be used to allocate memory, so an integer overflow can make a buffer overflow attack possible, says Steve Christey, CVE editor and principal information security engineer at Mitre.
Read darkreading story and the original report in Mitre.

2 Comments:

Anonymous Anonymous said...

Hi,
thanks araz to add my link in your weblog .
--Hessam.

3:24 AM  
Blogger Araz Samadi said...

good luck dear hessam

12:06 PM  

Post a Comment

<< Home