Writing Secure Code
| | ||
Here are the components to look for:
-
Input, whether read from the network, a file, or from the command line
-
Transfer of data from said input to internal structures
-
Use of unsafe string handling calls
-
Use of arithmetic to calculate an allocation size or remaining buffer size