A buffer overflow occurs when too much data is stuffed into a programs buffer (more than it was programmed to handle). The malicious code inserts instructions to the programs "stack" and causes the return address to execute the malicious code, usually a shell prompt or some other code to delete files, download rootkits, etc., instead of the code it was programmed to execute. It should be noted that a successful buffer overflow will give you the permissions of the user who owns the binary that is exploited. On Sun, 3 Mar 2002, MD. Tauhidul Islam wrote: > I heard about the linux vulnerability caused by the buffer overflow which allows intruders to execute arbitary command as root on the system. Can u guys tell me what actually happens behind the scene?? Moreover what are the services readily exposed to this kind of vulnerability? > > It would be very helpful if u can refer me to some weblink for detail info. > > ~ Tauhid ~ > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > "Sometimes Action Speaks Louder Than Words." > > > > ------------------------------------------------------------------------ > To unsubscribe email security-discuss-request@linuxsecurity.com > with "unsubscribe" in the subject of the message. > ------------------------------------------------------------------------ To unsubscribe email security-discuss-request@linuxsecurity.com with "unsubscribe" in the subject of the message.