wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Buffer Overflow

profile
Vrudanshi Bavliya
Sep 10, 2024
0 Likes
0 Discussions
77 Reads

What is Buffer? 

A buffer is a temporary data storage area with limited storage capacity. A buffer is typically area in the memory that is used to transfer data from one location to another location. Buffers are basically allocated in RAM to the processes. When any program is executed, it is loaded into RAM and some memory is temporarily allocated to the program called Buffer. 

How Buffer overflows? 

Buffer overflow is an attack that occurs when the amount of data that is submitted is larger than the buffer. For example in C, we create array of size 5. If the user enters data > 5,then it will override the data stored in memory further. Buffer are the container for data and in buffer overflow we stuff too much information into the container.

How to protect against buffer overflow? 

Basically this type of buffer is possible due to poorly written application code or operating system code. To protect against buffer overflow attacks programmers as well as organisation needs to ensure:-

1. Program should properly test/handle all the overflow conditions. 

2. Organisation should ensure all the operating systems and applications are update with latest updates, service packs and patches.



Comments ()


Sign in

Read Next

Health and fitness in technology

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

Kernel in Operating System

Blog banner

Zero-Day Attack

Blog banner

Making Money through Instagram

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Raid and levels of raid.

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

ahh wait a min

Blog banner

Data Analytics in Data Science

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

Linux -V Server Virtual Machine

Blog banner

Operating system and overviews

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Daycare Centres Help Children Transition into Structured Learning

Blog banner

Blog on health and fitness

Blog banner

Virtual Machine's

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

Types of Hackers.

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

Modern operating system

Blog banner

Online Education

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Memory Management in Operating System

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

5 Common Faults In Construction Tenders

Blog banner

Computer Security

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

GIS Bharat Maps

Blog banner

Banaras

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Virtual machine

Blog banner

Constrained Management in IT

Blog banner

AI and Cyber Security

Blog banner

Social Engineering

Blog banner

What is Packet Filtering?

Blog banner

Indian Food

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

MYNTRA

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner