The overflow buffer is used to satisfy peak memory requirements for any heap in the instance Shared memory region whenever a heap exceeds its configured size.
每当某个堆超出了其配置的大小时,便可以使用溢出缓冲区来满足实例共享内存区内任何堆的峰值需求。
Memory space breach — Accomplished via stack overflow, buffer overrun, or heap error, enables execution of arbitrary code supplied by the attacker with the permissions of the host process.
内存空间缺口——通过栈溢出、缓冲区溢出或堆错误来实现,以宿主进程的权限执行攻击者提供的任何代码。
Listing 1 does not validate user-supplied data when copying it to the buffer member of the previously allocated struct mystruct using the strcpy function, resulting in a heap-based buffer overflow.
在使用strcpy函数将用户提供的数据复制到先前分配的struct mystruct的buffer成员中时,清单1不验证用户提供的数据,造成堆中缓冲区溢出。
Listing 4. example2.c (vulnerable to a heap-based buffer overflow).
清单4 . example2 . c(容易出现基于堆的缓冲区溢出)。
Listing 1. example1.c (vulnerable to a heap-based buffer overflow).
清单1 . example1 . c(容易出现基于堆的缓冲区溢出)。
The following example is vulnerable to a heap-based buffer overflow
以下示例容易出现基于堆的缓冲区溢出
Buffer overflow attack mainly includes stack overflow, heap overflow and format string overflow and so on.
缓冲区溢出主要分为堆栈溢出、堆溢出和格式化字符串溢出等。
Buffer overflow attack mainly includes stack overflow, heap overflow and format string overflow and so on.
缓冲区溢出主要分为堆栈溢出、堆溢出和格式化字符串溢出等。
应用推荐