An attacker may be able to exploit a buffer overflow by changing the value of other data in the function; none of these approaches counter that.
攻击者也许能够通过改变函数中其他数据的值来利用缓冲区溢出;没有哪种方法能够防止这点。
This makes it much harder to manipulate the return address, but it doesn't defend against buffer overflow attacks that change the data of calling functions.
这样使得操纵返回地址困难多了,但它不会阻止改变调用函数的数据的缓冲区溢出攻击。
The data are extremely discouraging since the buffer overflow problem has been widely known in security circles for years.
由于缓冲区溢位问题近年来在安全性领域中已受到瞩目,这一资料是相当令人灰心的。
And the data show that the problem is growing instead of shrinking; see "Buffer overflow: Dejavu all over again".
并且资料显示这一问题正在扩大,而不是在缩减;请参阅「缓冲区溢位︰捲土重来」。
A buffer overflow, or buffer overrun, occurs when a process attempts to store data beyond the boundaries of a fixed-length buffer.
当进程尝试将数据储存到固定长度的缓冲区的范围之外时,就会出现缓冲区溢出。
Buffer overflow proves impossible as data copies only when room for extra data exists.
事实证明缓冲区溢出也不可能会发生,因为仅当存在额外数据空间时才会复制数据。
The important thing to realize about buffer overflows is that any data that happen to be allocated near the buffer can potentially be modified when the overflow occurs.
认识缓冲区溢位的重要一点是︰在发生溢位时,会潜在地修改碰巧指派在缓冲区附近的任何资料。
Listing 1 does not validate user-supplied data when copying it to the buffer member of the previously allocated struct mystruct using the strcpy function, resulting in a heap-based buffer overflow.
在使用strcpy函数将用户提供的数据复制到先前分配的struct mystruct的buffer成员中时,清单1不验证用户提供的数据,造成堆中缓冲区溢出。
An overflow occurs when data is added to the buffer outside the block of memory allocated to the buffer.
溢出是指数据被添加到分配给该缓冲区的内存块之外。
An overflow occurs when data is added to the buffer outside the block of memory allocated to the buffer.
溢出是指数据被添加到分配给该缓冲区的内存块之外。
应用推荐