LXer: How security flaws work: The buffer overflow
Published at LXer:
The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm—1988's Morris Worm—used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years later, buffer overflows remain a source of problems... Read More... |
All times are GMT -5. The time now is 03:44 AM. |