现在假设攻击者发送了超过buffer 1所能处理的数据。
Now imagine that an attacker has sent more data than buffer1 can handle.
然后攻击者发送一个充满SACK选项的包,目的是使另一方主机扫描整个队列以处理每个选项。
The attacker then sends a packet full of SACK options designed to force the other host to scan that entire queue to process each option.
攻击者发送的恶意数据可以欺骗处理程序,以执行计划外的命令或者访问未被授权的数据。
The attacker's hostile data can trick the interpreter into executing unintended commands or accessing unauthorized data.
应用推荐