• This is why our next four columns will deal with buffer overflow.

    就是下面四个专栏讨论缓冲区溢位原因

    youdao

  • Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.

    从根本上讲所有这些方法都能减轻程序接管攻击拒绝服务攻击缓冲区溢出攻击所带来的破坏

    youdao

  • Attacking using a buffer overflow can change this process and allow an attacker to execute any function they wish.

    利用缓冲区溢出进行攻击可以改变这个过程并且允许黑客执行任何他们期望函数

    youdao

  • An attacker may be able to exploit a buffer overflow by changing the value of other data in the function; none of these approaches counter that.

    攻击也许能够通过改变函数其他数据利用缓冲区溢出没有哪种方法能够防止这点。

    youdao

  • There are two main types of root exploits: buffer overflow attacks and executing scripts against a server.

    这里两种主要超级用户进入类型缓冲溢出攻击服务器上执行脚本

    youdao

  • Clearly, you would think by now that buffer overflow errors would be obsolete.

    很明显至此不会认为缓冲区溢位错误过时的。

    youdao

  • The return value is always the size of the combined string if no buffer overflow occurred; this makes it really easy to detect an overflow.

    如果没有发生缓冲区溢出返回始终组合字符串长度使得检测缓冲区溢出真正变得容易了。

    youdao

  • There are a number of tools that can help detect buffer overflow vulnerabilities before they're released.

    许多工具可以缓冲区溢出缺陷导致问题之前帮助检测它们

    youdao

  • And the data show that the problem is growing instead of shrinking; see "Buffer overflow: Dejavu all over again".

    并且资料显示这一问题正在扩大,而不是缩减;请参阅「缓冲区溢位︰捲土重来」。

    youdao

  • A creative attacker can take advantage of a buffer overflow vulnerability through stack-smashing and then run arbitrary code (anything at all).

    创造力的攻击者透过摧毁堆叠利用缓冲区溢位弱点然后执行任何程序码。

    youdao

  • In the instance of a buffer overflow attack, an internal value in a program is overflowed to alter how the program runs.

    缓冲区溢出攻击实例程序内部溢出,从而改变程序的运行方式。

    youdao

  • This makes it much harder to manipulate the return address, but it doesn't defend against buffer overflow attacks that change the data of calling functions.

    这样使得操纵返回地址困难多了不会阻止改变调用函数数据缓冲区溢出攻击

    youdao

  • For instance, a program designed to exploit a buffer overflow is very likely to use some inline assembly for the target platform.

    举例来说,设计利用缓存溢出程序可能目标平台使用内联汇编

    youdao

  • The data are extremely discouraging since the buffer overflow problem has been widely known in security circles for years.

    由于缓冲区溢位问题近年安全性领域受到瞩目,这一资料相当令人灰心的。

    youdao

  • In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.

    缓冲溢出攻击黑客利用程序执行期间存储分配中的特定计算机程序漏洞

    youdao

  • In the final two columns in this series, we'll examine the engine's workings and explain how a buffer overflow attack does its dirty work on particular architectures.

    系列最后两个专栏检查引擎工作说明缓冲区溢位攻击特定系统架构上是如何进行破坏的。

    youdao

  • For example, a buffer overflow in a network server program that can be tickled by outside users may provide an attacker with a login on the machine.

    例如外部使用者可以利用网路伺服器程序中的缓冲区溢位可能使攻击登入机器。

    youdao

  • This column gives an overview of the buffer overflow problem.

    专栏概述缓冲区溢位问题

    youdao

  • As a result, buffer overflow problems are often invisible during standard testing.

    因此缓冲区溢位问题常常标准测试期间是发现不了的。

    youdao

  • Buffer overflow proves impossible as data copies only when room for extra data exists.

    事实证明缓冲区溢出不可能会发生,因为存在额外数据空间时才会复制数据。

    youdao

  • All of these attacksand many othersexploited a vulnerability called a buffer overflow.

    所有这些攻击——以及其他许多攻击,都利用了一个称做缓冲区溢出的程序缺陷。

    youdao

  • A buffer overflow, or buffer overrun, occurs when a process attempts to store data beyond the boundaries of a fixed-length buffer.

    进程尝试数据储存固定长度缓冲区范围之外时,就会出现缓冲区溢出

    youdao

  • Looking at the program, it is also easier for an attacker to figure out how to cause a buffer overflow with real inputs.

    检视这个程序攻击者容易得出如何利用实际输入导致缓冲区溢位

    youdao

  • Doing so can lead some poorly written implementations into buffer overflow errors (and all that implies).

    这样使编写不够严谨的程序出现缓冲区溢出错误以及所有类似隐患)。

    youdao

  • The default installation of MySQL, particularly the empty root password and the potential vulnerability to buffer overflow, makes the database server an easy target for attacks.

    MySQL默认安装特别是密码空缺缓冲区溢出潜在漏洞使得这个数据库服务器成为容易攻击目标

    youdao

  • One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.

    恶意软件一种常见攻击类型所谓缓冲区溢出攻击,会使接受输入程序崩溃,web浏览器地址数据库搜索窗口

    youdao

  • The immediate cause of the vulnerability was that one of Sendmail's security checks was flawed, permitting a buffer overflow.

    造成漏洞直接原因Sendmail的一个安全检测有缺陷的,可以发生缓冲区溢出

    youdao

  • A fix for a buffer overflow problem in DHCPD (8).

    修复了dhcpd(8)中的缓冲区溢出问题

    youdao

  • The following example is vulnerable to a heap-based buffer overflow

    以下示例容易出现基于堆的缓冲区溢出

    youdao

  • Many well used UNIX applications, including LPR, xterm and eject, have been abused into giving up root through exploit of buffer overflow in suid regions of the code.

    许多得很好的UNIX应用程序包括lprxtermeject滥用,而程序码suid栏位利用缓冲区溢位放弃root权限。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定