Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Stack buffer overflow

Index Stack buffer overflow

In software, a stack buffer overflow or stack buffer overrun occurs when a program writes to a memory address on the program's call stack outside of the intended data structure, which is usually a fixed-length buffer. [1]

45 relations: Addison-Wesley, Address space layout randomization, Blaster (computer worm), Buffer overflow, C string handling, Call stack, Computer memory, Computer security, Control-flow integrity, Distributed Component Object Model, Exec Shield, Executable space protection, Exploit (computer security), Finger protocol, Grsecurity, Heap overflow, IBM Internet Security Systems, Integer overflow, Microsoft, Mod (video gaming), Morris worm, NX bit, PaX, Phrack, Reduced instruction set computer, Return-oriented programming, Return-to-libc attack, Security hacker, Security-Enhanced Linux, Setuid, Shellcode, SQL Slammer, Stack overflow, Storage violation, Super Smash Bros. Brawl, Superuser, The Legend of Zelda: Twilight Princess, Uncontrolled format string, United States Computer Emergency Readiness Team, Unix, Vulnerability (computing), Web server, Wii, Witty (computer worm), W^X.

Addison-Wesley

Addison-Wesley is a publisher of textbooks and computer literature.

New!!: Stack buffer overflow and Addison-Wesley · See more »

Address space layout randomization

Address space layout randomization (ASLR) is a computer security technique involved in preventing exploitation of memory corruption vulnerabilities.

New!!: Stack buffer overflow and Address space layout randomization · See more »

Blaster (computer worm)

Blaster Worm (also known as Lovsan, Lovesan or MSBlast) is a computer worm that spread on computers running operating systems Windows XP and Windows 2000, during August 2003.

New!!: Stack buffer overflow and Blaster (computer worm) · See more »

Buffer overflow

In information security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations.

New!!: Stack buffer overflow and Buffer overflow · See more »

C string handling

The C programming language has a set of functions implementing operations on strings (character strings and byte strings) in its standard library.

New!!: Stack buffer overflow and C string handling · See more »

Call stack

In computer science, a call stack is a stack data structure that stores information about the active subroutines of a computer program.

New!!: Stack buffer overflow and Call stack · See more »

Computer memory

In computing, memory refers to the computer hardware integrated circuits that store information for immediate use in a computer; it is synonymous with the term "primary storage".

New!!: Stack buffer overflow and Computer memory · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Stack buffer overflow and Computer security · See more »

Control-flow integrity

Control-flow integrity (CFI) is a general term for computer security techniques which prevent a wide variety of malware attacks from redirecting the flow of execution of a program.

New!!: Stack buffer overflow and Control-flow integrity · See more »

Distributed Component Object Model

Distributed Component Object Model (DCOM) is a proprietary Microsoft technology for communication between software components on networked computers.

New!!: Stack buffer overflow and Distributed Component Object Model · See more »

Exec Shield

Exec Shield is a project started at Red Hat, Inc in late 2002 with the aim of reducing the risk of worm or other automated remote attacks on Linux systems.

New!!: Stack buffer overflow and Exec Shield · See more »

Executable space protection

In computer security, executable-space protection marks memory regions as non-executable, such that an attempt to execute machine code in these regions will cause an exception.

New!!: Stack buffer overflow and Executable space protection · See more »

Exploit (computer security)

An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

New!!: Stack buffer overflow and Exploit (computer security) · See more »

Finger protocol

In computer networking, the Name/Finger protocol and the Finger user information protocol are simple network protocols for the exchange of human-oriented status and user information.

New!!: Stack buffer overflow and Finger protocol · See more »

Grsecurity

grsecurity is a set of patches for the Linux kernel which emphasize security enhancements.

New!!: Stack buffer overflow and Grsecurity · See more »

Heap overflow

A heap overflow or heap overrun is a type of buffer overflow that occurs in the heap data area.

New!!: Stack buffer overflow and Heap overflow · See more »

IBM Internet Security Systems

IBM Internet Security Systems, formerly Internet Security Systems, and often known simply as ISS or ISSX (after its former NASDAQ ticker symbol) is a security software provider founded in 1994.

New!!: Stack buffer overflow and IBM Internet Security Systems · See more »

Integer overflow

In computer programming, an integer overflow occurs when an arithmetic operation attempts to create a numeric value that is outside of the range that can be represented with a given number of bits – either larger than the maximum or lower than the minimum representable value.

New!!: Stack buffer overflow and Integer overflow · See more »

Microsoft

Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

New!!: Stack buffer overflow and Microsoft · See more »

Mod (video gaming)

A mod (short for "modification") is an alteration that changes some aspects or one aspect of a video game, such as how it looks or behaves.

New!!: Stack buffer overflow and Mod (video gaming) · See more »

Morris worm

The Morris worm or Internet worm of November 2, 1988, was one of the first computer worms distributed via the Internet.

New!!: Stack buffer overflow and Morris worm · See more »

NX bit

The NX bit (no-execute) is a technology used in CPUs to segregate areas of memory for use by either storage of processor instructions (code) or for storage of data, a feature normally only found in Harvard architecture processors.

New!!: Stack buffer overflow and NX bit · See more »

PaX

PaX is a patch for the Linux kernel that implements least privilege protections for memory pages.

New!!: Stack buffer overflow and PaX · See more »

Phrack

Phrack is an ezine written by and for hackers, first published November 17, 1985.

New!!: Stack buffer overflow and Phrack · See more »

Reduced instruction set computer

A reduced instruction set computer, or RISC (pronounced 'risk'), is one whose instruction set architecture (ISA) allows it to have fewer cycles per instruction (CPI) than a complex instruction set computer (CISC).

New!!: Stack buffer overflow and Reduced instruction set computer · See more »

Return-oriented programming

Return-oriented programming (ROP) is a computer security exploit technique that allows an attacker to execute code in the presence of security defenses such as executable space protection and code signing.

New!!: Stack buffer overflow and Return-oriented programming · See more »

Return-to-libc attack

A "return-to-libc" attack is a computer security attack usually starting with a buffer overflow in which a subroutine return address on a call stack is replaced by an address of a subroutine that is already present in the process’ executable memory, bypassing the NX bit feature (if present) and ridding the attacker of the need to inject their own code.

New!!: Stack buffer overflow and Return-to-libc attack · See more »

Security hacker

A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.

New!!: Stack buffer overflow and Security hacker · See more »

Security-Enhanced Linux

Security-Enhanced Linux (SELinux) is a Linux kernel security module that provides a mechanism for supporting access control security policies, including United States Department of Defense–style mandatory access controls (MAC).

New!!: Stack buffer overflow and Security-Enhanced Linux · See more »

Setuid

setuid and setgid (short for "set user ID upon execution" and "set group ID upon execution", respectively) are Unix access rights flags that allow users to run an executable with the permissions of the executable's owner or group respectively and to change behaviour in directories.

New!!: Stack buffer overflow and Setuid · See more »

Shellcode

In hacking, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability.

New!!: Stack buffer overflow and Shellcode · See more »

SQL Slammer

SQL Slammer is a 2003 computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic.

New!!: Stack buffer overflow and SQL Slammer · See more »

Stack overflow

In software, a stack overflow occurs if the call stack pointer exceeds the stack bound.

New!!: Stack buffer overflow and Stack overflow · See more »

Storage violation

In computing a storage violation is a hardware or software fault that occurs when a task attempts to access an area of computer storage which it is not permitted to access.

New!!: Stack buffer overflow and Storage violation · See more »

Super Smash Bros. Brawl

is a crossover fighting game, the third installment in the ''Super Smash Bros.'' series, developed by Sora Ltd. and Game Arts and published by Nintendo for the Wii video game console.

New!!: Stack buffer overflow and Super Smash Bros. Brawl · See more »

Superuser

In computing, the superuser is a special user account used for system administration.

New!!: Stack buffer overflow and Superuser · See more »

The Legend of Zelda: Twilight Princess

The Legend of Zelda: Twilight Princess is an action-adventure game developed and published by Nintendo for the Wii and GameCube home video game consoles.

New!!: Stack buffer overflow and The Legend of Zelda: Twilight Princess · See more »

Uncontrolled format string

Uncontrolled format string is a type of software vulnerability discovered around 1989 that can be used in security exploits.

New!!: Stack buffer overflow and Uncontrolled format string · See more »

United States Computer Emergency Readiness Team

The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD).

New!!: Stack buffer overflow and United States Computer Emergency Readiness Team · See more »

Unix

Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Stack buffer overflow and Unix · See more »

Vulnerability (computing)

In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.

New!!: Stack buffer overflow and Vulnerability (computing) · See more »

Web server

Web server refers to server software, or hardware dedicated to running said software, that can serve contents to the World Wide Web.

New!!: Stack buffer overflow and Web server · See more »

Wii

The Wii is a home video game console released by Nintendo on November 19, 2006.

New!!: Stack buffer overflow and Wii · See more »

Witty (computer worm)

The Witty worm is a computer worm that attacks the firewall and other computer security products written by a particular company, Internet Security Systems (ISS) now IBM Internet Security Systems.

New!!: Stack buffer overflow and Witty (computer worm) · See more »

W^X

W^X ("Write XOR Execute"; spoken as W xor X) is a security feature in operating systems and virtual machines.

New!!: Stack buffer overflow and W^X · See more »

Redirects here:

Smashing the stack, Stack based buffer overflow, Stack buffer overflows, Stack buffer overrun, Stack canaries, Stack canary, Stack overflow exploit, Stack smashing.

References

[1] https://en.wikipedia.org/wiki/Stack_buffer_overflow

OutgoingIncoming
Hey! We are on Facebook now! »