home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page792.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  103KB  |  817x1045  |  8-bit (256 colors)
Labels: book | chat room | computer | crt screen | hakham | monitor | reckoner | sky
OCR: 724 SECTION CHAPTER 1.2 Buffer overflows can be triggered by input specifically designed to execute malicious code One of the first exploits to take advantage of buffer over- flows was the Morris worm, which attacked the Internet in 1988 Since that time Microsoft alone has disclosed hundreds of buffer overflow vulnerabili- ties in commonly used Windows components, such as Internet Explorer, Outlook Outlook Express, Troubleshooter, and Play, the file decom- pression routine, and the routine that renders Windows Metafiles Sloppy c and C+. programming sets the stage for buffer overflows and C++ the two languages most commonly used for professional software development, offer little protection against buffer ove rflows. Commonly used routines such as get( and strcpy0, from the standard librari ...