Computer Science, asked by kamrealam9507, 9 months ago

developers of the web application ------- buffer which is large enough

Answers

Answered by Balarohith7brainly
3

Buffer overflow occurs when a program tries to store more data in a temporary storage area than it can hold. Writing outside the allocated memory area can corrupt the data, crash the program or cause the execution of malicious code that can allow an attacker to modify the target process address space.

Description: Buffer overflow occurs when data that is written to buffer ends up corrupting data values in memory addresses as well. Buffer overflow attacks happen when bad programming practices (that supply the framework) leave open vulnerabilities. It is common in a few programming languages because they expose low level details of buffers for data types. Many memory manipulation functions in programming language do not operate bounds checking and can quickly overwrite the allocated buffers they operate upon. This is a common mistake in web application development. One needs to allocate buffers that are large enough or check for overflow problems. Buffer overflow can be present in web applications that serve the static and dynamic expression. Attackers use buffer overflows to damage the execution stack of web applications. It is not like the typical e-mail virus where users can protect themselves by not opening the attached files. In buffer overflow attacks, users do not even have to open the message to enable the attack. By detecting a variable within some bounds before it is used can prevent buffer overflows. In buffer overflow attacks, the additional data may contain codes designed to turn on specific actions, in effect conveying new instructions to the attacked computer.

Authorization

PREV DEFINITIONCiphertext

NEXT DEFINITION

Related Defintions

Secure Sockets Layer (ssl)

Secure Sockets Layer (SSL) is a protocol developed by Netscape for establishing an encrypted link be

Cross-site Scripting

Cross-site scripting (XSS) is a type of computer security vulnerability. It is accounted for almost

Dns Spoofing

DNS Spoofing is a type of computer attack wherein a user is forced to navigate to a fake website dis

Ciphertext

Cipher is an algorithm which is applied to plain text to get ciphertext. It is the unreadable output

Computer Worm

A computer worm is a malicious, self-replicating software program (popularly termed as 'malware') wh

Computer Virus

A computer virus is a malicious software program loaded onto a user’s computer without the user’s kn

Denial-of-service Attack

Denial-Of-Service (DoS) is an attack targeted at depriving legitimate users from online services. It

Memory Corruption

Memory corruption can be described as the vulnerability that may occur in a computer system when its

Trojan

Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that

Authentication

Authentication is the process of recognizing a user’s identity. It is the mechanism of associating a

Similar questions