O'Reilly logo

Real-World Bug Hunting by Peter Yaworski

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

13MEMORY VULNERABILITIES

Image

Every application relies on computer memory to store and execute the application’s code. A memory vulnerability exploits a bug in the application’s memory management. The attack results in unintended behavior that could enable an attacker to inject and execute their own commands.

Memory vulnerabilities occur in programming languages where developers are responsible for applications’ memory management, such as in C and C++. Other languages, like Ruby, Python, PHP, and Java, manage memory allocation for developers, making these languages less susceptible to memory bugs.

Before performing any dynamic action in C or C++, a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required