Team 1 Sect1.2

From CyberSecurity
Jump to: navigation, search

Buffer overflows are most easily exploited when the data buffer is in the program's function stack, since this can lead directly to an alteration of the program's execution path. Determining the exploitability of a buffer overflow vulnerability can be difficult, even for experience programmers, since it involves a lot of high and low level knowledge of the architechture internals and target program. Overflows of as little as a single byte beyond the end of the buffer have proven exploitable.