wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Buffer Overflow

profile
Vrudanshi Bavliya
Sep 10, 2024
0 Likes
0 Discussions
77 Reads

What is Buffer? 

A buffer is a temporary data storage area with limited storage capacity. A buffer is typically area in the memory that is used to transfer data from one location to another location. Buffers are basically allocated in RAM to the processes. When any program is executed, it is loaded into RAM and some memory is temporarily allocated to the program called Buffer. 

How Buffer overflows? 

Buffer overflow is an attack that occurs when the amount of data that is submitted is larger than the buffer. For example in C, we create array of size 5. If the user enters data > 5,then it will override the data stored in memory further. Buffer are the container for data and in buffer overflow we stuff too much information into the container.

How to protect against buffer overflow? 

Basically this type of buffer is possible due to poorly written application code or operating system code. To protect against buffer overflow attacks programmers as well as organisation needs to ensure:-

1. Program should properly test/handle all the overflow conditions. 

2. Organisation should ensure all the operating systems and applications are update with latest updates, service packs and patches.



Comments ()


Sign in

Read Next

Memory Management Techniques

Blog banner

Threads

Blog banner

Operating Systems

Blog banner

Clarizen

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Is Your Password Complex Enough?

Blog banner

The application udemy

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Virtual Machine

Blog banner

Multithreading in Operating System

Blog banner

Subnet Masking

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Cross site scripting Attack

Blog banner

5 Stages of Digital Marketing

Blog banner

Routers

Blog banner

Creating Digitally Signed Document

Blog banner

Processes: Process Description and Control.

Blog banner

The Future of Web Development in 2026: Trends Every Business Must Know

Blog banner

10 Unknown facts about India's Independence

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Operating system and overviews

Blog banner

Cyber Laws In India and Around the World

Blog banner

Riddhi Miyani 53003220140

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Delhi city

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

In the world of Technology...

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Semaphores

Blog banner

The art of being alone

Blog banner

Blockchain in IoT Applications

Blog banner

What is a geographic information system (GIS)?

Blog banner

Ubiquitous Computing

Blog banner

Data is an asset and it is your responsibility!

Blog banner

objectives and function of operating system

Blog banner

File management

Blog banner

Chicken Dum Biryani

Blog banner

Guidelines for a low sodium diet.

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

IoT Evolution

Blog banner