Home / Vulnerability Database / C or C++ : Tainted buffer overflow
C/C++

C or C++ : Tainted buffer overflow

Overview

An argument obtained from an unreliable source is used for writing to the buffer. This may lead to a buffer overflow. An attacker is able to overrun the buffer’s boundary and execute an arbitrary code or perform a DoS attack on the system.

MEDIUM

DerScanner Severity Score

Do you want to fix C or C++ : Tainted buffer overflow in your application?

See also

C/C++

C or C++ : Dead store

C/C++

C or C++ : Use after free

C/C++

C or C++ : va_list uninitialized