Stack buffer overflow

Stack buffer overflow

In software, a stack buffer overflow or stack buffer overrun occurs when a program writes to a memory address on the program's call stack outside of the intended data structure, which is usually a fixed-length buffer.Stack buffer overflow bugs are caused when a program writes more data to a buffer located on the stack than what is actually allocated for that buffer. This almost always results in corruption of adjacent data on the stack, and in cases where the overflow was triggered by mistake, will often cause the program to crash or operate incorrectly. Stack buffer overflow is a type of the more general programming malfunction known as buffer overflow (or buffer overrun). Overfilling a buffer on the stack is more likely to derail program execution than overfilling a buffer on the heap be

Comment
enIn software, a stack buffer overflow or stack buffer overrun occurs when a program writes to a memory address on the program's call stack outside of the intended data structure, which is usually a fixed-length buffer.Stack buffer overflow bugs are caused when a program writes more data to a buffer located on the stack than what is actually allocated for that buffer. This almost always results in corruption of adjacent data on the stack, and in cases where the overflow was triggered by mistake, will often cause the program to crash or operate incorrectly. Stack buffer overflow is a type of the more general programming malfunction known as buffer overflow (or buffer overrun). Overfilling a buffer on the stack is more likely to derail program execution than overfilling a buffer on the heap be
Depiction
Stack Overflow 2.png
Stack Overflow 3.png
Stack Overflow 4.png
Has abstract
enIn software, a stack buffer overflow or stack buffer overrun occurs when a program writes to a memory address on the program's call stack outside of the intended data structure, which is usually a fixed-length buffer.Stack buffer overflow bugs are caused when a program writes more data to a buffer located on the stack than what is actually allocated for that buffer. This almost always results in corruption of adjacent data on the stack, and in cases where the overflow was triggered by mistake, will often cause the program to crash or operate incorrectly. Stack buffer overflow is a type of the more general programming malfunction known as buffer overflow (or buffer overrun). Overfilling a buffer on the stack is more likely to derail program execution than overfilling a buffer on the heap because the stack contains the return addresses for all active function calls. A stack buffer overflow can be caused deliberately as part of an attack known as stack smashing. If the affected program is running with special privileges, or accepts data from untrusted network hosts (e.g. a webserver) then the bug is a potential security vulnerability. If the stack buffer is filled with data supplied from an untrusted user then that user can corrupt the stack in such a way as to inject executable code into the running program and take control of the process. This is one of the oldest and more reliable methods for attackers to gain unauthorized access to a computer.
Is primary topic of
Stack buffer overflow
Label
enStack buffer overflow
Link from a Wikipage to an external page
www.ee.ryerson.ca/~elf/hack/iworm.html
web.archive.org/web/20070814051604/http:/www.icsi.berkeley.edu/~nweaver/login_witty.txt
www.wired.com/wired/archive/11.07/slammer.html
Link from a Wikipage to another Wikipage
Animal sentinel
ASLR
Blaster worm
Buffer overflow
Call stack
Category:Computer errors
Category:Computer security exploits
Category:Software anomalies
Category:Software bugs
Code segment
Computer memory
Control-flow integrity
Data buffer
Data Execution Prevention
Distributed Component Object Model
ExecShield
Exploit (computer security)
File:Stack Overflow 2.png
File:Stack Overflow 3.png
File:Stack Overflow 4.png
Finger protocol
Format string vulnerability
Hacker (computer security)
Heap overflow
Instruction pointer
Integer overflow
Internet Security Systems
Microsoft
Mod (video gaming)
Morris worm
NX Bit
Position-independent code
Return-oriented programming
Return-to-libc attack
RISC
Security-Enhanced Linux
Security vulnerability
Setuid
Shellcode
SQL Slammer
Stack overflow
Storage violation
Super Smash Bros. Brawl
Superuser
The Legend of Zelda: Twilight Princess
Unix
W%5EX
Webserver
Wii
Witty worm
SameAs
Desbordamiento de pila
Lzdj
m.02x3nhx
Přetečení na zásobníku
Q1343128
Stack buffer overflow
Tràn bộ đệm ngăn xếp
Переповнення стекового буфера
سرریز بافر پشته
栈缓冲区溢出
스택 버퍼 오버플로
Subject
Category:Computer errors
Category:Computer security exploits
Category:Software anomalies
Category:Software bugs
Thumbnail
Stack Overflow 2.png?width=300
WasDerivedFrom
Stack buffer overflow?oldid=1115013785&ns=0
WikiPageLength
21491
Wikipage page ID
12759537
Wikipage revision ID
1115013785
WikiPageUsesTemplate
Template:Citation needed
Template:Clarify
Template:Further
Template:Main
Template:Mono
Template:Other uses
Template:Reflist
Template:Short description