DevNet Associate DEVASC 200-901 Official Certification Guide by Adrian Iliesiu (z-lib.org)

(andrew) #1

ThreatThreatWhat It DoesWhat It DoesMitigation OptionsMitigation Options


B u f f e r o v e r

fl
o
w

An attacker uses a program to try to cause
an application to store that input in a buffer
that isn’t large enough. The attacker’s data
overwrites portions of memory connected to
the buffer space. Attackers can use a buffer
overflow to modify a computer’s memory
and undermine or take control of program
execution.

Sep
ara
te
exe
cut
abl
e
me
mo
ry
fro
m
no
n-
exe
cut
abl
e
me
mo
ry.

Ra
nd
om
ize
ad
dre
ss
spa
ces
for
dat
a.

Us
e
the
bui
lt-
in
pro
tect
ion
opt
ion
s in
ne
Free download pdf