Ten Buffer Overflow Attacks
Now that you have a detailed understanding of how buffer overflow attacks work and the different variations, we will cover ten different buffer overflow exploits. The first five will be covered in detail; the remaining five will be brief overviews because they are relatively new exploits:
NetMeeting Buffer Overflow
Outlook Buffer Overflow
Linuxconf Buffer Overflow
ToolTalk Buffer Overflow
IMPAD Buffer Overflow
AOL Instant Messenger Buffer Overflow
AOL Instant Messenger BuddyIcon Buffer Overflow
Windows 2000 ActiveX Control Buffer Overflow
IIS 4.0/5.0 Phone Book Server Buffer Overflow
SQL Server 2000 Extended Stored Procedure Buffer Overflow
These exploits are performed on all systems from UNIX to Windows and include several ...
Get Hackers Beware now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.