...
Code Block |
---|
int main(int argc, char *argv[]) { char *buff; buff = (char *) malloc(BUFSIZE); if (!buff) { /* handle error condition */ } ... strncpy(buff, argv[1], BUFSIZE-1); ... free(buff); } |
Priority: P18 Level:
...
L1
Reading memory that has already been freed can lead to abnormal program termination and denial-of-service attacks. Writing memory that has already been freed can lead to the execution of arbitrary code with the permissions of the vulnerable process.
...