How security flaws work: The buffer overflow

Posted by BernardSwiss on Aug 27, 2015 10:07 AM EDT
Ars Technica; By Peter Bright
Mail this story
Print this story

The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm—1988's Morris Worm—used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years later, buffer overflows remain a source of problems...

Full Story

  Nav
» Read more about: Story Type: Tutorial

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.