NULL pointer dereference issues can occur through a number of flaws, including race conditions and simple programming omissions. This course introduces ways to identify and mitigate this security weakness, referenced as CWE-476 by the 2020 CWE Top 25.
On successful completion of this course, learners should have the knowledge and skills to:
- Use a vetted library or framework (such as SafeStr) that does not allow this weakness to occur
- Use a vetted library or framework that provides constructs to make this weakness easier to avoid
- Double check that your buffer is as large as you specify
- Check buffer boundaries when accessing the buffer in a loop to ensure that you are not in danger of writing past the allocated space