CWE-170 Improper Null Termination

Memory Flaws Boot Camp

Part 1 of 4

CWE-170 Improper Null Termination

In this tutorial, students will get an overview of the security weaknesses defined by improper null termination (CWE-170).

Previous Course | View All Courses | Next Course

Course Details

CWE-170 Improper Null Termination | Duration: 15 minutes

Course Description

The course begins with an overview of the causes and problems of improper null termination. The course further explains the security impact of the weakness described by Common Weakness Enumeration CWE-170. A technical description of the issue is presented, along with code examples showing the vulnerability. Finally, the course describes the strategies that you can use to mitigate the weakness described by CWE-170.

At the end of this course, you will be able to:

  • Describe the causes and problems of improper null termination.
  • Identify the security impact and consequences of improper null termination.
  • Describe the technical aspects and recognize examples of code depicting the vulnerability.
  • Identify the remediation strategies used to solve problems caused by improper null termination.