[Home] [Credit Search] [Category Browser] [Staff Roll Call] | The LINUX.COM Article Archive |
Originally Published: Friday, 21 July 2000 | Author: Alexander Reelsen |
Published to: news_enhance_security/Security News | Page: 1/1 - [Printable] |
How buffer overflows work
[ZD] A "buffer overflow" attack deliberately enters more data than a program was written to handle. The extra data, "overflowing" the region of memory set aside to accept it, overwrites another region of memory that was meant to hold some of the program's instructions. The values thus introduced become new instructions that give the attacker control of the target computer.
|