National Institute of Standards and Technology

Testing Exploitable Buffer Overflows From Open Source Code

Download

Description

Zitser, Lippmann, and Leek extracted 14 model programs from internet applications (BIND, Sendmail, WU-FTP) with known buffer overflows. These models have the portion of code with the overflows. Patched versions are also included. Examples of using these are in "Using Exploitable Buffer Overflows From Open Source Code" 2004.

Displaying test cases 1 - 25 of 28 in total