wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Buffer Overflow

profile
Vrudanshi Bavliya
Sep 10, 2024
0 Likes
0 Discussions
77 Reads

What is Buffer? 

A buffer is a temporary data storage area with limited storage capacity. A buffer is typically area in the memory that is used to transfer data from one location to another location. Buffers are basically allocated in RAM to the processes. When any program is executed, it is loaded into RAM and some memory is temporarily allocated to the program called Buffer. 

How Buffer overflows? 

Buffer overflow is an attack that occurs when the amount of data that is submitted is larger than the buffer. For example in C, we create array of size 5. If the user enters data > 5,then it will override the data stored in memory further. Buffer are the container for data and in buffer overflow we stuff too much information into the container.

How to protect against buffer overflow? 

Basically this type of buffer is possible due to poorly written application code or operating system code. To protect against buffer overflow attacks programmers as well as organisation needs to ensure:-

1. Program should properly test/handle all the overflow conditions. 

2. Organisation should ensure all the operating systems and applications are update with latest updates, service packs and patches.



Comments ()


Sign in

Read Next

Virtual memory

Blog banner

Install Ubuntu in Vmware

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

Benefits of Yoga

Blog banner

Wrike

Blog banner

Artificial Intelligence (AI)

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Memory Management

Blog banner

Spyware

Blog banner

Different types of scam Fraud

Blog banner

Deadlock in operating system

Blog banner

Deadlock

Blog banner

OLA

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

Embaded operating system

Blog banner

computer security

Blog banner

VPN

Blog banner

What is a geographic information system (GIS)?

Blog banner

Guidelines for a low sodium diet.

Blog banner

Race Condition in Operating Theatre

Blog banner

Functions of operating system

Blog banner

Note on Process, Process creation and Process termination

Blog banner

Facebook marketing

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

Mumbai

Blog banner

SQL Injection Techniques

Blog banner

Memory Management

Blog banner

IP ADDRESS

Blog banner

What is Virtual Memory

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Kafka - A Framework

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Steganography

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Multiprocessor scheduling

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

objectives and functions of operating system

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner