Perform an Extra Review of Pointer Code
If you analyze most buffer overrun exploits, you'll notice they involve overwriting a pointer to change the code execution flow. You should therefore double-check any code for buffer overruns if pointers are close by. This includes C++ classes with virtual methods, function pointers, linked lists, and so on. Of course, the easiest pointer to overwrite is a stack-based function return address.