On Fri, Nov 7, 2014, at 02:03, k...@shike2.com wrote:
> I disagree, check the size before of calling strcpy. If you want to
> avoid security risk you also have to check the output of strlcpy
> to detect truncations, so you don't win anything. In both cases
> you have to add a comparision, so it is better to use strcpy that
> is standard.

There are numerous scenarios where an overflow has security implications
but a truncation does not. For example, if an attacker can supply any
string, they could supply the shorter one to begin with, and therefore
don't benefit from truncation.

Reply via email to