z-logo
open-access-imgOpen Access
Buffer Overflow Attack Vulnerability in Stack
Author(s) -
Pradeep Murugan,
Dr.K. Alagarsamy
Publication year - 2011
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/1780-2455
Subject(s) - computer science , buffer overflow , vulnerability (computing) , stack (abstract data type) , buffer (optical fiber) , computer security , computer network , operating system , telecommunications
Most of the vulnerability based on buffer overflows aim at forcing the execution of malicious code, mainly in order to give a root shell to the user. The malicious instructions are stored in a buffer, which is overflowed to allow an unexpected use of the process, by changing various memory sections. Buffer overflow attacks exploit a need of bounds checking on the size of input being stored in a buffer array. By writing the data into the memory assigned to array, the attacker can make arbitrary changes to program state stored an adjacent to the array. A buffer overflow is an inconsistent, where a process attempts to store data beyond the boundaries of a fixed length buffer. So that the additional data overwrites next memory the techniques to exploit buffer overflow vulnerability vary per architecture, operating system and memory region locations. The overwritten data may include other buffers, variables and program flow data a technically inclined and malicious user may exploit stack-based buffer overflows to manipulate the program[9,10].

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom