{"title":"缓冲区溢出","authors":"Ahmed Sheikh","doi":"10.1002/9781118720608.ch9","DOIUrl":null,"url":null,"abstract":"Assignment #3 Buffer Overflow Due: October 15, 2015 The learning objective of this assignment is for students to gain first-hand experience with a buffer overflow vulnerability, applying what they have learned about this type of vulnerability in class. A buffer overflow is defined as the condition in which a program attempts to write data beyond the boundaries of a fixed length buffers. This vulnerability can be exploited by a malicious user to alter the control flow of the program or even execute arbitrary pieces of code sent by the attacker. This vulnerability arises due to the mixing of the storage for data (e.g. buffers) and the storage for controls (e.g. return addresses): an overflow in the data part can affect the control flow of the program, because an overflow can change the return address.","PeriodicalId":352834,"journal":{"name":"Certified Ethical Hacker (CEH) Preparation Guide","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Buffer Overflow\",\"authors\":\"Ahmed Sheikh\",\"doi\":\"10.1002/9781118720608.ch9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Assignment #3 Buffer Overflow Due: October 15, 2015 The learning objective of this assignment is for students to gain first-hand experience with a buffer overflow vulnerability, applying what they have learned about this type of vulnerability in class. A buffer overflow is defined as the condition in which a program attempts to write data beyond the boundaries of a fixed length buffers. This vulnerability can be exploited by a malicious user to alter the control flow of the program or even execute arbitrary pieces of code sent by the attacker. This vulnerability arises due to the mixing of the storage for data (e.g. buffers) and the storage for controls (e.g. return addresses): an overflow in the data part can affect the control flow of the program, because an overflow can change the return address.\",\"PeriodicalId\":352834,\"journal\":{\"name\":\"Certified Ethical Hacker (CEH) Preparation Guide\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Certified Ethical Hacker (CEH) Preparation Guide\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/9781118720608.ch9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Certified Ethical Hacker (CEH) Preparation Guide","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/9781118720608.ch9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Assignment #3 Buffer Overflow Due: October 15, 2015 The learning objective of this assignment is for students to gain first-hand experience with a buffer overflow vulnerability, applying what they have learned about this type of vulnerability in class. A buffer overflow is defined as the condition in which a program attempts to write data beyond the boundaries of a fixed length buffers. This vulnerability can be exploited by a malicious user to alter the control flow of the program or even execute arbitrary pieces of code sent by the attacker. This vulnerability arises due to the mixing of the storage for data (e.g. buffers) and the storage for controls (e.g. return addresses): an overflow in the data part can affect the control flow of the program, because an overflow can change the return address.