paint-brush
Stack Overflow Vulnerabilityby@botman1001
5,738 reads
5,738 reads

Stack Overflow Vulnerability

by Abhishek Singh Thakur3mDecember 4th, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

When we enter data in a buffer more than its capacity the data overflows to adjacent memory location causing program to crash. An attacker or hacker can use this vulnerability to exploit the system. Stack Overflow is an old vulnerability in the C or C++ languages, because in these languages we can use pointer freely. The code was compiled and run on Ubuntu 18.04 using a simple C program to understand this vulnerability. It doesn’t allow checking the size of the data being entered.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Stack Overflow Vulnerability
Abhishek Singh Thakur HackerNoon profile picture
Abhishek Singh Thakur

Abhishek Singh Thakur

@botman1001

L O A D I N G
. . . comments & more!

About Author

Abhishek Singh Thakur HackerNoon profile picture
Abhishek Singh Thakur@botman1001

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here