wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

BUFFER OVERFLOW_142

profile
Meet Kothari
Sep 09, 2024
0 Likes
0 Discussions
79 Reads

A buffer is a temporary area for data storage. When more data (than was originally allocated to be stored) gets placed by a program or system process, the extra data overflows. It causes some of that data to leak out into other buffers, which can corrupt or overwrite whatever data they were holding.

In a buffer-overflow attack, the extra data sometimes holds specific instructions for actions intended by a hacker or malicious user; for example, the data could trigger a response that damages files, changes data or unveils private information.

Attacker would use a buffer-overflow exploit to take advantage of a program that is waiting on a user’s input. There are two types of buffer overflows: stack-based and heap-based. Heap-based, which are difficult to execute and the least common of the two, attack an application by flooding the memory space reserved for a program. Stack-based buffer overflows, which are more common among attackers, exploit applications and programs by using what is known as a stack memory space used to store user input.

Buffer overflow is a software coding error or vulnerability that can be exploited by hackers to gain unauthorized access to corporate systems. It is one of the best-known software security vulnerabilities yet remains fairly common. This is partly because buffer overflows can occur in various ways and the techniques used to prevent them are often error-prone.

The software error focuses on buffers, which are sequential sections of computing memory that hold data temporarily as it is transferred between locations. Also known as a buffer overrun, buffer overflow occurs when the amount of data in the buffer exceeds its storage capacity. That extra data overflows into adjacent memory locations and corrupts or overwrites the data in those locations.

 


Comments ()


Sign in

Read Next

Virtual Machine

Blog banner

Deadlock and Starvation

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

Dal Bafla Recipe

Blog banner

Photorec - media recovery tool

Blog banner

Chicken Dum Biryani

Blog banner

Computer Security

Blog banner

I/O Buffering

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Stop Racism

Blog banner

File Systems in OS.

Blog banner

Virtual Memory

Blog banner

Why we fail after giving 100% ?

Blog banner

Modern Operating System - Suren Kotian

Blog banner

Cache memory

Blog banner

virtual machine

Blog banner

File system implementation

Blog banner

Domain Name System

Blog banner

Royal enfield

Blog banner

Be you

Blog banner

Cross site scripting Attack

Blog banner

Importance of internet

Blog banner

Deadlock

Blog banner

Fossil Hunting 101 at the Peace River, Arcadia, Florida, USA

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

Visualization in Data Science

Blog banner

Deadlock

Blog banner

Deadlocks in Operating Systems

Blog banner

Quality check in IT services

Blog banner

Emerging threats in cyber Forensics

Blog banner

Why is online marketing is important in current scenario

Blog banner

About myself

Blog banner

PERSONAL STORIES

Blog banner

Artical on FreshBooks

Blog banner

NIKE

Blog banner

Disk Scheduling

Blog banner

RAID and It's Levels

Blog banner

Explain Multiprocessors

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Process in OS

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner