News
1.1 Stack-based buffer overflow - Target: The program's call stack, a region used to store function parameters, local variables, and the return address (where to continue execution after a function ...
A Stack-based buffer overflow vulnerability in the SMA100 series web interface allows remote, unauthenticated attacker to cause Denial of Service (DoS) or potentially results in code execution.
What is a buffer overflow, how is this software vulnerability exploited by hackers and how can you defend against buffer overflow attacks?
Stack-based buffer overrun (or stack-based buffer overflow) is a bug that indicates that a program writes more data to a buffer located on the stack than is actually allocated for the buffer.
Software countermeasures to mitigate buffer overflow attacks suffer from excessive memory and/or performance overhead. With such overhead, the defender can use software-only approaches only to the ...
The remaining bugs are stack-based buffer overflows, all of which allow an attacker to run code on the production control system.
Before popping the return address, two return address values are compared to detect any malicious activity, thus preventing the exploitation of the stack based buffer overflow vulnerabilities. The ...
The new version of Cyrus IMAP Server also patches unspecified boundary errors in “fetchnews,” “backend,” and “imapd,” which can all cause stack-based buffer overflows.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results