The stack-smashing attack is in fact a type of buffer overflow attack, and may sometimes be called a stack buffer overflow attack. Memory management vulnerabilities such as stack-smashing attacks are extremely dangerous. This sort of security compromise is known as a "stack-smashing attack" and, depending on the software whose vulnerability to the attack is exploited and that program's execution environment, might even lead to a root compromise of the OS itself. If a malicious security cracker is able to intentionally exceed the stack space allocated to a variable, he or she can use malformed data to actually affect program control flow in a deliberate way. If it does, that additional data can overwrite other data stored on the stack and cause problems for other variables and program control flow. Variables whose memory is allocated on the stack need to be carefully managed so that data stored in them will not exceed the stack space that has been allocated. Program control flow is also managed by the stack. Forth is a language that has gained some fame specifically for its focus on stack-based programming. A memory structure used in many programming languages to store state - variable values, for instance - is known as the "stack." The most well-known languages to rely heavily on the stack are probably C and C++.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |