Buffer overflow: Difference between revisions
Jump to navigation
Jump to search
imported>Eric M Gearhart (Added Smashing the Stack and references section) |
imported>Eric M Gearhart (Added External Links) |
||
Line 8: | Line 8: | ||
| retrievedate=2007-04-09 | | retrievedate=2007-04-09 | ||
}}</ref> | }}</ref> | ||
==External Links== | |||
[http://insecure.org/stf/smashstack.html "Smashing the Stack for Fun and Profit"] This article is a bit dated, but it covers in great technical detail this flaw | |||
==References== | ==References== |
Revision as of 12:00, 9 April 2007
In computers and computer security, a buffer overflow occurs when more data than was expected is written to a memory buffer than was intended by a programmer.
This error is the most common type of Computer security flaw that is used to run code on a remote machine unintentionally.
Other names for this attack include "buffer overrun" and "Smashing the Stack," both of which describe the concept.[1]
External Links
"Smashing the Stack for Fun and Profit" This article is a bit dated, but it covers in great technical detail this flaw