Thursday, November 24, 2005

Buffer Overflows

Acting as a popular intrusion method among hackers for quite a while now, buffer overflows blast a computer program or process with more data than it can hold, and when hackers (sometimes via worms) include malicious code in the data, they can seize full access to the remote computer system.
Because computer systems need to be flexible, they often utilize buffers (temporary data storage areas). These areas accept data that overflows from the original program or process, and because buffers only accept a certain amount of information, excess data can overflow yet again, possibly affecting valid data in other areas. Hackers and worms abuse this process by flooding the buffers with malicious instructions.


Post a Comment

<< Home