• An attacker may be able to exploit a buffer overflow by changing the value of other data in the function; none of these approaches counter that.

    攻击也许能够通过改变函数其他数据利用缓冲区溢出没有哪种方法能够防止这点。

    youdao

  • This makes it much harder to manipulate the return address, but it doesn't defend against buffer overflow attacks that change the data of calling functions.

    这样使得操纵返回地址困难多了不会阻止改变调用函数数据缓冲区溢出攻击

    youdao

  • The data are extremely discouraging since the buffer overflow problem has been widely known in security circles for years.

    由于缓冲区溢位问题近年安全性领域受到瞩目,这一资料相当令人灰心的。

    youdao

  • And the data show that the problem is growing instead of shrinking; see "Buffer overflow: Dejavu all over again".

    并且资料显示这一问题正在扩大,而不是缩减;请参阅「缓冲区溢位︰捲土重来」。

    youdao

  • A buffer overflow, or buffer overrun, occurs when a process attempts to store data beyond the boundaries of a fixed-length buffer.

    进程尝试数据储存固定长度缓冲区范围之外时,就会出现缓冲区溢出

    youdao

  • Buffer overflow proves impossible as data copies only when room for extra data exists.

    事实证明缓冲区溢出不可能会发生,因为存在额外数据空间时才会复制数据。

    youdao

  • The important thing to realize about buffer overflows is that any data that happen to be allocated near the buffer can potentially be modified when the overflow occurs.

    认识缓冲区重要一点发生溢位潜在地修改碰巧指派缓冲区附近任何资料

    youdao

  • Listing 1 does not validate user-supplied data when copying it to the buffer member of the previously allocated struct mystruct using the strcpy function, resulting in a heap-based buffer overflow.

    使用strcpy函数用户提供数据复制先前分配struct mystruct的buffer成员中时,清单1验证用户提供的数据,造成堆中缓冲区溢出。

    youdao

  • An overflow occurs when data is added to the buffer outside the block of memory allocated to the buffer.

    溢出指数据被添加分配给该缓冲区内存之外

    youdao

  • An overflow occurs when data is added to the buffer outside the block of memory allocated to the buffer.

    溢出指数据被添加分配给该缓冲区内存之外

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定