• What's a buffer overflow?

    什么缓冲区溢出

    www.ibm.com

  • What is a buffer overflow?

    什么缓冲区溢位

    www.ibm.com

  • A fix for a buffer overflow problem in DHCPD (8).

    修复了dhcpd(8)中的缓冲区溢出问题

    www.ibm.com

  • This column gives an overview of the buffer overflow problem.

    专栏概述缓冲区溢位问题

    www.ibm.com

  • But the buffer overflow problem is far from ancient history.

    但是缓冲区问题并非已成古老历史

    www.ibm.com

  • This is why our next four columns will deal with buffer overflow.

    就是下面四个专栏讨论缓冲区溢位原因

    www.ibm.com

  • The following example is vulnerable to a heap-based buffer overflow

    以下示例容易出现基于堆的缓冲区溢出

    www.ibm.com

  • Listing 4. example2.c (vulnerable to a heap-based buffer overflow).

    清单4 . example2 . c(容易出现基于堆的缓冲区溢出)。

    www.ibm.com

  • Clearly, you would think by now that buffer overflow errors would be obsolete.

    很明显至此不会认为缓冲区溢位错误过时的。

    www.ibm.com

  • So far, all our examples of buffer overflow exploits have been for UNIX systems.

    目前我们所有利用缓冲区溢位范例针对UNIX系统的。

    www.ibm.com

  • As a result, buffer overflow problems are often invisible during standard testing.

    因此缓冲区溢位问题常常标准测试期间是发现不了的。

    www.ibm.com

  • Buffer overflow proves impossible as data copies only when room for extra data exists.

    事实证明缓冲区溢出不可能会发生,因为存在额外数据空间才会复制数据。

    www.ibm.com

  • All of these attacksand many othersexploited a vulnerability called a buffer overflow.

    所有这些攻击——以及其他许多攻击,都利用了一个称做缓冲区溢出的程序缺陷。

    www.ibm.com

  • A buffer overflow in a program such as find is likely to be a risk to a great number of systems.

    诸如find这样程序中的缓冲区溢出可能大量的系统带来风险

    www.ibm.com

  • Don't rely on dynamic allocation for everything and forget about the buffer overflow problem.

    不要依靠动态指派所有一切遗忘缓冲区溢位问题

    www.ibm.com

  • There are a number of tools that can help detect buffer overflow vulnerabilities before they're released.

    许多工具可以缓冲区溢出缺陷导致问题之前帮助检测它们

    www.ibm.com

  • Doing so can lead some poorly written implementations into buffer overflow errors (and all that implies).

    这样使编写不够严谨的程序出现缓冲区溢出错误以及所有类似隐患)。

    www.ibm.com

  • There are two main types of root exploits: buffer overflow attacks and executing scripts against a server.

    这里两种主要超级用户进入类型缓冲溢出攻击服务器上执行脚本

    www.ibm.com

  • And the data show that the problem is growing instead of shrinking; see "Buffer overflow: Dejavu all over again".

    并且资料显示问题正在扩大,而不是缩减;请参阅缓冲区溢位︰捲土重来」。

    www.ibm.com

  • Attacking using a buffer overflow can change this process and allow an attacker to execute any function they wish.

    利用缓冲区溢出进行攻击可以改变这个过程并且允许黑客执行任何他们期望函数

    www.ibm.com

  • Because PHP manages memory for you, there's no PHP code that can result in stack and buffer overflow exploits.

    因为PHP可以管理记忆所以PHP代码不会导致堆栈缓冲溢出

    www.ibm.com

  • This tracking or recomputation is easy to get wrong, and any mistake can open the door to a buffer overflow attack.

    这种跟踪重新计算容易出错任何错误都可能缓冲区攻击打开方便之门。

    www.ibm.com

  • In the instance of a buffer overflow attack, an internal value in a program is overflowed to alter how the program runs.

    缓冲区溢出攻击实例程序内部溢出从而改变程序的运行方式。

    www.ibm.com

  • Looking at the program, it is also easier for an attacker to figure out how to cause a buffer overflow with real inputs.

    检视这个程序攻击者容易得出如何利用实际输入导致缓冲区溢位

    www.ibm.com

  • The data are extremely discouraging since the buffer overflow problem has been widely known in security circles for years.

    由于缓冲区溢位问题近年安全性领域受到瞩目,资料相当令人灰心的。

    www.ibm.com

  • After all, someone could have changed the bytecode manually with a hex editor to attempt to trigger a buffer overflow.

    毕竟,也许有人已经十六进编辑器手工修改字节符试图触发缓冲器溢出。

    www.ibm.com

  • The immediate cause of the vulnerability was that one of Sendmail's security checks was flawed, permitting a buffer overflow.

    造成漏洞直接原因Sendmail的一个安全检测有缺陷的,可以发生缓冲区溢出

    www.ibm.com

  • For instance, a program designed to exploit a buffer overflow is very likely to use some inline assembly for the target platform.

    举例来说,设计利用缓存溢出程序可能目标平台使用内联汇编

    www.ibm.com

  • A buffer overflow, or buffer overrun, occurs when a process attempts to store data beyond the boundaries of a fixed-length buffer.

    进程尝试数据储存到固定长度缓冲区范围之外时,就会出现缓冲区溢出

    www.ibm.com

  • The return value is always the size of the combined string if no buffer overflow occurred; this makes it really easy to detect an overflow.

    如果没有发生缓冲区溢出返回始终组合字符串长度使得检测缓冲区溢出真正变得容易了。

    www.ibm.com

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定