Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns

Posted in Internet Security Whitepapers, Exploit Writing Techniques

0.0/5 rating (0 votes)

This article describes three powerful general-purpose families of exploits for buffer overruns: arc injection, pointer subterfuge, and heap smashing. These new techniques go beyond the traditional "stack smashing" attack and invalidate traditional assumptions about buffer overruns. Security vulnerabilities related to buffer overruns account for the largest share of CERT advisories, as well as high-profile worms—from the original Internet Worm in 1987 through Blaster’s appearance in 2003. When malicious crackers discover a vulnerability, they devise exploits that take advantage of the vulnerability to attack a system.
∙:∙ If you have trouble viewing this document, please click the link below!
Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns

Comments (0)

Leave a comment

Please login to leave a comment. Optional login below.