wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Buffer Overflow

profile
Vrudanshi Bavliya
Sep 10, 2024
0 Likes
0 Discussions
77 Reads

What is Buffer? 

A buffer is a temporary data storage area with limited storage capacity. A buffer is typically area in the memory that is used to transfer data from one location to another location. Buffers are basically allocated in RAM to the processes. When any program is executed, it is loaded into RAM and some memory is temporarily allocated to the program called Buffer. 

How Buffer overflows? 

Buffer overflow is an attack that occurs when the amount of data that is submitted is larger than the buffer. For example in C, we create array of size 5. If the user enters data > 5,then it will override the data stored in memory further. Buffer are the container for data and in buffer overflow we stuff too much information into the container.

How to protect against buffer overflow? 

Basically this type of buffer is possible due to poorly written application code or operating system code. To protect against buffer overflow attacks programmers as well as organisation needs to ensure:-

1. Program should properly test/handle all the overflow conditions. 

2. Organisation should ensure all the operating systems and applications are update with latest updates, service packs and patches.



Comments ()


Sign in

Read Next

Uniprocessor scheduling

Blog banner

Layers Of Blockchain

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

Assessing Incident Detection Response Process

Blog banner

Virtual Memory

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Malware

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

File Management In OS

Blog banner

Memory management

Blog banner

What is Data, Information and Knowledge?

Blog banner

Jira Software

Blog banner

Threads

Blog banner

Theads

Blog banner

Service Operation

Blog banner

BENIFITS OF YOGA

Blog banner

Career v/s Job : Choose your passion

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Deadlock

Blog banner

Mobile Transport Layer – Traditional TCP

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

gis substation

Blog banner

Ola

Blog banner

25 Movies to Watch Post Breakup Blues

Blog banner

Process State

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

TRAIN TRAVELING

Blog banner

Webmail

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

LISP - Library Management System

Blog banner

Odoo

Blog banner

c

Blog banner

Processes: Process Description and Control.

Blog banner

Banaras

Blog banner

Health and fitness

Blog banner

The IT Service Lifecycle

Blog banner

Broken Authentication Attacks

Blog banner

Memory Management

Blog banner

Whatsapp Messenger

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner