Discover Security Projects News
A Buffer Overflow Study: Attacks & Defenses
It aims at presenting an overview of generic solutions which may be applied to a whole system, although it is a non-exhaustive one."
On november 2, 1988 a new form of threat appeared with the Morris Worm, also known as the Internet Worm. This famous event caused heavy damages on the internet, by using two common unix programs, sendmail and fingerd. This was possible by exploiting a buffer overflow in fingerd. This is probably one of the most outstanding attacks based on buffer overflows.
This kind of vulnerability has been found on largely spread and used daemons such as bind, wu-ftpd, or various telnetd implementations, as well as on applications such as Oracle or MS Outlook Express...
The link for this article located at Pierre-Alain FAYOLLE, Vincent GLAUME is no longer available.