wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Buffer Overflow

profile
Vrudanshi Bavliya
Sep 10, 2024
0 Likes
0 Discussions
77 Reads

What is Buffer? 

A buffer is a temporary data storage area with limited storage capacity. A buffer is typically area in the memory that is used to transfer data from one location to another location. Buffers are basically allocated in RAM to the processes. When any program is executed, it is loaded into RAM and some memory is temporarily allocated to the program called Buffer. 

How Buffer overflows? 

Buffer overflow is an attack that occurs when the amount of data that is submitted is larger than the buffer. For example in C, we create array of size 5. If the user enters data > 5,then it will override the data stored in memory further. Buffer are the container for data and in buffer overflow we stuff too much information into the container.

How to protect against buffer overflow? 

Basically this type of buffer is possible due to poorly written application code or operating system code. To protect against buffer overflow attacks programmers as well as organisation needs to ensure:-

1. Program should properly test/handle all the overflow conditions. 

2. Organisation should ensure all the operating systems and applications are update with latest updates, service packs and patches.



Comments ()


Sign in

Read Next

DNS Cache

Blog banner

MAILFENCE

Blog banner

Ubiquitous Computing

Blog banner

Real time scheduling

Blog banner

Europe Through My Lens

Blog banner

Online Education

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Internet of Things and cyber security

Blog banner

Man is free by the birth .

Blog banner

Understanding the 'Ambiverts'

Blog banner

Operating system evolution

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

Not anti-social, but pro-solitude

Blog banner

Virtual machine.

Blog banner

10 Problems you face if you are an Otaku

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Traditional Unix System

Blog banner

Kafka - A Framework

Blog banner

Expert System In AI

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

Malware Defense

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

How to use GIT & GITHUB

Blog banner

Virtual memory in os

Blog banner

Virtualization

Blog banner

Technological Advancement

Blog banner

Operating System Objectives and Functions

Blog banner

Importance of Education

Blog banner

Hubspot

Blog banner

Multiple processor scheduling

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Hosting basics

Blog banner

Email Privacy

Blog banner

Risk factors in service transistion

Blog banner

File Management system

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

Deadlock

Blog banner

Information Technology In E- Commerce

Blog banner

How to Conquer Depression ?

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner