"Occurs when a program attempts to move more data into a memory location than is allocated to hold that data. Buffer overflow problems are often security-critical." (Mark S Merkow & Lakshmikanth Raghavan, "Secure and Resilient Software Development", 2010)
"Copying too much information to a memory location, leading to denial of service or elevation of privilege attacks." (Mark Rhodes-Ousley, "Information Security: The Complete Reference" 2nd Ed.", 2013)
"A defect in a computer program that could cause a system to crash and leave the user with heightened privileges" (Nell Dale & John Lewis, "Computer Science Illuminated, 6th Ed.", 2015)
"Occurs in an application when more information is stored in the buffer than the space reserved for it." (Mike Harwood, "Internet Security: How to Defend Against Attackers on the Web" 2nd Ed., 2015)
"Too much data is put into the buffers that make up a stack. Common attack vector used by attackers to run malicious code on a target system." (Adam Gordon, "Official (ISC)2 Guide to the CISSP CBK" 4th Ed., 2015)
"A memory access failure due to the attempt by a process to store data beyond the boundaries of a fixed length buffer, resulting in overwriting of adjacent memory areas or the raising of an overflow exception. See also buffer." (SQA)
No comments:
Post a Comment