
Stack buffer overflow
In software, a stack buffer overflow or stack buffer overrun occurs when a program writes to a memory address on the program's call stack outside of the intended data structure, which is usually a fixed-length buffer.Stack buffer overflow bugs are caused when a program writes more data to a buffer located on the stack than what is actually allocated for that buffer. This almost always results in corruption of adjacent data on the stack, and in cases where the overflow was triggered by mistake, will often cause the program to crash or operate incorrectly. Stack buffer overflow is a type of the more general programming malfunction known as buffer overflow (or buffer overrun). Overfilling a buffer on the stack is more likely to derail program execution than overfilling a buffer on the heap be
- Abnormality114501726
- Abstraction100002137
- Accomplishment100035189
- Act100030358
- Action100037396
- Anomaly114505821
- Attribute100024264
- Condition113920835
- Error107299569
- Event100029378
- Feat100036762
- Happening107283608
- PhysicalCondition114034177
- PsychologicalFeature100023100
- State100024720
- WikicatComputerErrors
- WikicatComputerSecurityExploits
- WikicatSoftwareAnomalies
- YagoPermanentlyLocatedEntity
- Comment
- enIn software, a stack buffer overflow or stack buffer overrun occurs when a program writes to a memory address on the program's call stack outside of the intended data structure, which is usually a fixed-length buffer.Stack buffer overflow bugs are caused when a program writes more data to a buffer located on the stack than what is actually allocated for that buffer. This almost always results in corruption of adjacent data on the stack, and in cases where the overflow was triggered by mistake, will often cause the program to crash or operate incorrectly. Stack buffer overflow is a type of the more general programming malfunction known as buffer overflow (or buffer overrun). Overfilling a buffer on the stack is more likely to derail program execution than overfilling a buffer on the heap be
- Depiction
- Has abstract
- enIn software, a stack buffer overflow or stack buffer overrun occurs when a program writes to a memory address on the program's call stack outside of the intended data structure, which is usually a fixed-length buffer.Stack buffer overflow bugs are caused when a program writes more data to a buffer located on the stack than what is actually allocated for that buffer. This almost always results in corruption of adjacent data on the stack, and in cases where the overflow was triggered by mistake, will often cause the program to crash or operate incorrectly. Stack buffer overflow is a type of the more general programming malfunction known as buffer overflow (or buffer overrun). Overfilling a buffer on the stack is more likely to derail program execution than overfilling a buffer on the heap because the stack contains the return addresses for all active function calls. A stack buffer overflow can be caused deliberately as part of an attack known as stack smashing. If the affected program is running with special privileges, or accepts data from untrusted network hosts (e.g. a webserver) then the bug is a potential security vulnerability. If the stack buffer is filled with data supplied from an untrusted user then that user can corrupt the stack in such a way as to inject executable code into the running program and take control of the process. This is one of the oldest and more reliable methods for attackers to gain unauthorized access to a computer.
- Is primary topic of
- Stack buffer overflow
- Label
- enStack buffer overflow
- Link from a Wikipage to an external page
- www.ee.ryerson.ca/~elf/hack/iworm.html
- web.archive.org/web/20070814051604/http:/www.icsi.berkeley.edu/~nweaver/login_witty.txt
- www.wired.com/wired/archive/11.07/slammer.html
- Link from a Wikipage to another Wikipage
- Animal sentinel
- ASLR
- Blaster worm
- Buffer overflow
- Call stack
- Category:Computer errors
- Category:Computer security exploits
- Category:Software anomalies
- Category:Software bugs
- Code segment
- Computer memory
- Control-flow integrity
- Data buffer
- Data Execution Prevention
- Distributed Component Object Model
- ExecShield
- Exploit (computer security)
- File:Stack Overflow 2.png
- File:Stack Overflow 3.png
- File:Stack Overflow 4.png
- Finger protocol
- Format string vulnerability
- Hacker (computer security)
- Heap overflow
- Instruction pointer
- Integer overflow
- Internet Security Systems
- Microsoft
- Mod (video gaming)
- Morris worm
- NX Bit
- Position-independent code
- Return-oriented programming
- Return-to-libc attack
- RISC
- Security-Enhanced Linux
- Security vulnerability
- Setuid
- Shellcode
- SQL Slammer
- Stack overflow
- Storage violation
- Super Smash Bros. Brawl
- Superuser
- The Legend of Zelda: Twilight Princess
- Unix
- W%5EX
- Webserver
- Wii
- Witty worm
- SameAs
- Desbordamiento de pila
- Lzdj
- m.02x3nhx
- Přetečení na zásobníku
- Q1343128
- Stack buffer overflow
- Tràn bộ đệm ngăn xếp
- Переповнення стекового буфера
- سرریز بافر پشته
- 栈缓冲区溢出
- 스택 버퍼 오버플로
- Subject
- Category:Computer errors
- Category:Computer security exploits
- Category:Software anomalies
- Category:Software bugs
- Thumbnail
- WasDerivedFrom
- Stack buffer overflow?oldid=1115013785&ns=0
- WikiPageLength
- 21491
- Wikipage page ID
- 12759537
- Wikipage revision ID
- 1115013785
- WikiPageUsesTemplate
- Template:Citation needed
- Template:Clarify
- Template:Further
- Template:Main
- Template:Mono
- Template:Other uses
- Template:Reflist
- Template:Short description