例如,外部使用者可以利用的网路伺服器程序中的缓冲区溢位,可能使攻击者登入到机器。
For example, a buffer overflow in a network server program that can be tickled by outside users may provide an attacker with a login on the machine.
他们声明能够成功操纵使用者输入到达易受攻击的缓冲区从而造成安全性破坏的可能性已非常小了。
They declared the likelihood was very low that user input could be successfully manipulated to reach a vulnerable buffer in such a way as to cause a security violation.
如果有不怀好意的使用者覆写缓冲区,则会变更标志的值,从而指出攻击者是非法存取专用文件。
If a malicious user can overwrite the buffer, then the value of the flag can be changed, thus providing the attacker with illegal access to private files.
应用推荐