Home / Vulnerability Database / C or C++ : Tainted buffer overflow
C/C++
C or C++ : Tainted buffer overflow
Classification
Overview
An argument obtained from an unreliable source is used for writing to the buffer. This may lead to a buffer overflow. An attacker is able to overrun the buffer’s boundary and execute an arbitrary code or perform a DoS attack on the system.
MEDIUM
DerScanner Severity Score
Do you want to fix C or C++ : Tainted buffer overflow in your application?
See also
C/C++
C or C++ : Dead store
C/C++
C or C++ : Use after free
C/C++
