Buffer Overflow
Buffer Overflow
INTRODUCTION
The concept of buffer overflows has been around for as early as 1972, buffer
overflows were understood and partially publicly documented in the Computer
Security Technology Planning Study. Buffer overflows have been recognized as
significant vulnerabilities that need to be addressed in software development. Buffer
overflow is a common type of cybercrime that occurs when a computer program
attempts to write more data to a buffer, a temporary storage area, than it can hold. This
results in data being written to adjacent memory locations, which can lead to serious
consequences for individuals and organizations.
KEY FINDINGS
In the Philippines, there isn’t a specific law that directly addresses buffer
overflow. However, cybercrimes, including hacking and unauthorized access to
systems, which can be facilitated by buffer overflow, are regulated under the
Cybercrime Prevention Act of 2012, also known as Republic Act No. 10175. This law
covers system interference, misuse of devices, and unauthorized access, which can
encompass buffer overflow attacks if they are used maliciously to compromise a
system
A buffer is a temporary storage area in memory, often used to store data being
transferred between two places, like between your computer and a hard drive, or
between an application and the network. Buffers are crucial in many aspects of
computing, including file operations, graphics rendering, and network
communication.
On the other hand, a buffer overflow is a situation where more data is written
to a buffer than it can hold. This can lead to data being written into adjacent memory
spaces, potentially causing erratic program behavior, memory access errors, or even
crashes. In the worst-case scenario, buffer overflows can be exploited by malicious
actors to execute arbitrary code, leading to security vulnerabilities.
Imagine you have a small mailbox that can only hold 5 letters at a time. One
day, you receive 10 letters. Since your mailbox can only hold 5, the extra 5 letters
overflow and drop onto the ground. In the digital world, instead of just falling onto
the ground, these ‘overflowing letters’ could overwrite important information or even
execute malicious code.
In a computer program scenario, let’s say there’s an application that asks for a
username, and it only allocates 50 characters of memory for this purpose. If a user
enters a username that is longer than 50 characters, the additional characters will
overflow into adjacent memory spaces. This overflow can overwrite other data in the
program, causing it to behave unexpectedly, crash, or worse, it could be exploited to
execute harmful code or reveal sensitive information.
SUMMARY
CONCLUSION
References:
1. Fortinet. (n.d.). What Is Buffer Overflow? Attacks, Types & Vulnerabilities.
Retrieved from https://www.fortinet.com/resources/cyberglossary/buffer-overflow
2. Spiceworks. (2023, July 21). Buffer Overflow Attack Meaning, Types, and
Prevention. Retrieved from https://www.spiceworks.com/it-security/application-
security/articles/what-is-buffer-overflow-attack/
3. CSO Online. (2020, January 22). What is a buffer overflow? And how hackers
exploit these. Retrieved from https://www.csoonline.com/article/568835/what-is-a-
buffer-overflow-and-how-hackers-exploit-these-vulnerabilities.html
4. G2. (2023, February 15). What is Buffer Overflow? Prevention and Types of Buffer
Attacks. Retrieved from https://www.g2.com/articles/buffer-overflow