What is the overflow of the tank buffer?

The tank buffer overflow is what happens when the program is input into a computer memory that is longer than the allocated space. Under certain circumstances, this can damage other data in memory, causing problems when running a computer. In other cases, overflowing of the tank buffer can be used by malicious applications to take control of other parts of the computer. One version of this, The Call Stack, is a list that a computer program uses to track different parts of the program, subroutines that work at any particular moment. Since the call magazine works temporarily and must be accessible quickly, it is placed in the computer memory rather than in a permanent storage such as a hard drive.

Since modern operating systems allow multiple programs to run at a time, it is necessary to arrange the way of memory, including the calls of the magazines. This is done efficiently by assigning the buffer memories, the space in the memory designed to be sufficientlyLarge to deal with the maximum space required by a specific level of memory. In most cases, part of the space will be unused, so it acts as a buffer between data from different applications, leaving the space to equalize if someone suddenly requires additional space. One way to visualize would be to think of a library that allocated a certain amount of space of each area of ​​the object, and make sure we leave some other space to equalize if, for example, all books on one subject were in the library at the same time than to log out.

The tank buffer overflows when the program writes the tank data to the buffer in a way that exceeds the allocated space. This can happen by mistake, USUALLY through a program error. For example, if the application is designed to allow the user to enter the phone number but does not limit the number of characters that can be entered can be a hacker able to useunlimited fields to intentionally cause overflow of the reservoir buffer. Depending on how the operating system works, it could allow a hacker to indirectly access another application or the operating system itself.

There are several approaches to alleviate the effects of overflowing of the reservoir buffer. One is known as the randomization of the address space layout. This will randomly arrange the most important data areas on the computer. The idea is that even if the hacker causes or uses the overflow of the tank buffer, it will not be able to use a violation in a reliable way.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?