LXer: How security flaws work: The buffer overflow
by LXer from LinuxQuestions.org on (#JMGY)
Published at LXer:
The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm-1988's Morris Worm-used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years later, buffer overflows remain a source of problems...
Read More...
The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm-1988's Morris Worm-used a buffer overflow in the Unix finger daemon to spread from machine to machine. Twenty-seven years later, buffer overflows remain a source of problems...
Read More...