buffer overflow

Furmanek, Greg plug-devel@lists.PLUG.phoenix.az.us
Wed Aug 22 10:48:01 2001


http://mercury.chem.pitt.edu/~tiho/LinuxFocus/English/May2001/article190.sht
ml
here you go this should be what you are looking for.

> -----Original Message-----
> From: Lucas Vogel [mailto:lvogel@exponent.com]
> Sent: Thursday, August 23, 2001 9:30 AM
> To: Plug-Devel (E-mail)
> Subject: buffer overflow
> 
> 
> It seems as though every time I look at my favorite 
> distribution's website
> (SuSE, in case you were curious) for software updates, there 
> are a number of
> different security updates due to some kind of buffer 
> overflow situation in
> one piece of software or another. Would someone care to go over buffer
> overflows, how they are exploited and good preventative programming
> practices?
> 
> Thanks
> 
> ===========================================
> Lucas Vogel
> Technology Development Practice
> Exponent Failure Analysis Associates, Inc.
> http://www.fail.com
> ===========================================
> 
> 
> _______________________________________________
> PLUG-devel mailing list  -  PLUG-devel@lists.PLUG.phoenix.az.us
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-devel
> 


"The sender believes that this E-mail and any attachments were free of any
virus, worm, Trojan horse, and/or malicious code when sent.  This message
and its attachments could have been infected during transmission.  By
reading the message and opening any attachments, the recipient accepts full
responsibility for taking protective and remedial action about viruses and
other defects.  The sender's employer is not liable for any loss or damage
arising in any way from this message or its attachments."