Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Buffer Overflow

Posted on by

Buffer Overflow is a vulnerability in software due to improper boundary checks, where an attacker exploits the target system by writing overwhelming data to the software memory buffer to overflow the buffer’s capacity and then making the malicious data to be written in the adjacent memory location giving un-authorized access. 

There are two types of buffer overflow:

Stack Based Over Flow is an attack where an attacker gets control of the Extended Instruction Pointer (EIP) of Stack Memory which points to the next instruction to be executed and then makes the EIP to point to the memory location in which the malicious process instruction is present.

Heap Based Over Flow is almost same as stack over flow attack. Heap is dynamic memory allocation given to a program during the run time. The attacker takes the control of the Heap memory allocation and points it to the malicious code.

Common Weakness Enumeration (CWE) References

CWE – CWE-121: Stack-based Buffer Overflow (4.17)

CWE – CWE-122: Heap-based Buffer Overflow (4.17)

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme