ThreatThreatWhat It DoesWhat It DoesMitigation OptionsMitigation Options
B u f f e r o v e r
fl
o
w
An attacker uses a program to try to cause
an application to store that input in a buffer
that isn’t large enough. The attacker’s data
overwrites portions of memory connected to
the buffer space. Attackers can use a buffer
overflow to modify a computer’s memory
and undermine or take control of program
execution.
Sep
ara
te
exe
cut
abl
e
me
mo
ry
fro
m
no
n-
exe
cut
abl
e
me
mo
ry.
Ra
nd
om
ize
ad
dre
ss
spa
ces
for
dat
a.
Us
e
the
bui
lt-
in
pro
tect
ion
opt
ion
s in
ne