Re: Buffer Overflow

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




A buffer overflow occurs when too much data is stuffed into a programs
buffer (more than it was programmed to handle).  The malicious code
inserts instructions to the programs "stack" and causes the return address
to execute the malicious code, usually a shell prompt or some other code
to delete files, download rootkits, etc., instead of the code it was
programmed to execute.   It should be noted that a successful buffer
overflow will give you the permissions of the user who owns the binary
that is exploited.

On Sun, 3 Mar 2002, MD. Tauhidul Islam wrote:

> I heard about the linux vulnerability caused by the buffer overflow which allows intruders to execute arbitary command as root on the system. Can u guys tell me what actually happens behind the scene?? Moreover what are the services readily exposed to this kind of vulnerability?
>
> It would be very helpful if u can refer me to some weblink for detail info.
>
> ~ Tauhid ~
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> "Sometimes Action Speaks Louder Than Words."
>
>
>
> ------------------------------------------------------------------------
>      To unsubscribe email security-discuss-request@linuxsecurity.com
>          with "unsubscribe" in the subject of the message.
>


------------------------------------------------------------------------
     To unsubscribe email security-discuss-request@linuxsecurity.com
         with "unsubscribe" in the subject of the message.


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux