Many of the crashes resulting from fuzz testing are direct results of memory allocation mistakes and buffer overflows.
由模糊测试导致的许多故障都是内存分配错误及缓冲器溢出的直接结果。
Why are buffer overflows so common?
为什么缓冲区溢出如此常见?
New tricks to counter buffer overflows.
防止缓冲区溢出的新技术。
Dying buffer overflows is important for me.
死亡缓冲区溢出重要的是我。
Why are buffer overflows a security problem?
为什么缓冲区溢位是安全性问题?
In fact, buffer overflows are becoming more common.
事实上,缓冲区溢位正越来越普遍。
Let's start with a quick review of buffer overflows.
现在让我们快速回顾一下缓冲区溢出问题。
Buffer overflows are the cause of many a security bug.
缓冲区溢出是许多安全性问题的起因。
Common C and C + + mistakes that permit buffer overflows.
导致缓冲区溢出的常见c和C+ +错误。
However, none of this lets developers ignore buffer overflows.
然而,没有哪种方法允许开发人员忽略缓冲区溢出。
Buffer overflows have been causing serious security problems for decades.
几十年来,缓冲区溢位一直引起许多严重的安全性问题。
Some languages have "escape" clauses that allow buffer overflows to occur.
有些语言存在允许缓冲区溢出发生的“转义”子句。
Buffer overflows begin with something every program needs: a place to put bits.
缓冲区溢位开始于每个程序都需要的一些情况︰放置位元的空间。
This prevents the server from doing added CPU and disk work if the buffer overflows.
这可防止在缓冲区溢出时服务器进行额外的CPU和磁盘工作。
A simple solution for buffer overflows is to switch to a language that prevents them.
针对缓冲区溢出的一种简单解决办法就是转为使用能够防止缓冲区溢出的语言。
Let's dig deeper into why some kinds of buffer overflows have big security implications.
让我们更深入地了解某些缓冲区溢位会造成严重安全性隐患的原因。
Another way in which buffer overflows cause security problems is through stack-smashing attacks.
缓冲区溢位导致安全性问题的另一个方法是透过摧毁堆叠。
We'll go into the details of stack smashing in our third and fourth columns on buffer overflows.
我们将在缓冲区溢位的第三和第四专栏中详细讨论堆叠的摧毁。
Commonly, attackers exploit buffer overflows to get an interactive session (shell) on the machine.
一般地,攻击者利用缓冲区溢位得到机器上的交谈式Session (shell)。
The most spectacular buffer overflows are stack smashes that result in a superuser, or root, shell.
最惊人的缓冲区溢位是堆叠的摧毁,它会在超级使用者或root、shell 中造成后果。
Buffer overflows cause many software weaknesses and, therefore, are the basis of malicious exploits.
缓冲区溢出导致许多软件出现漏洞,并因此为恶意开发提供了可乘之机。
Some people believe that it's harder to find buffer overflows in Windows programs than in UNIX programs.
有些人认为在Windows程序中寻找缓冲区溢位比在UNIX程序中难。
In chart above, the number of vulnerabilities that can be directly attributed to buffer overflows is displayed.
以上图表中,显示了可以直接归为缓冲区溢位的弱点数。
Very long descriptors cause buffer overflows on the PS3, allowing code to be injected onto the stack and executed.
非常长的描述会引起PS3缓存溢出,导致允许代码注入栈并被执行。
In debug builds the MSVC compiler adds in extra data to help detect buffer overflows and use of uninitialized memory.
在调试版本中msvc编译器添加额外的数据来检测缓冲区溢出和使用未初始化的内存。
In this column we've introduced you to buffer overflows, which are probably the worst software security problem of all time.
在本专栏中,介绍了缓冲区溢位,它永远可能是最糟的软体安全性问题。
In doing so, it triggers a series of buffer overflows allowing it to write various pieces of data and code to the stack.
这样做,它触发出一系列的缓存溢出,以允许自己向栈写入许多数据和代码。
Ada normally detects and prevents buffer overflows (raising an exception on the attempt), but various pragmas can disable this.
Ada一般会检测和防止缓冲区溢出(即针对这样的尝试引发一个异常),但是不同的程序可能会禁用这个特性。
An alternative is to use another programming language, since almost all of today's other languages protect against buffer overflows.
一种替代方法是使用另一种编程语言,因为如今的几乎其他所有语言都能防止缓冲区溢出。
Likewise, when a buffer overflows, the excess data may trample on other meaningful data that the program might wish to access in the future.
同样地,当缓冲区溢位时,额外的资料会摧残程序将来可能要存取的其它有用的资料。
应用推荐