Question

In: Computer Science

Select the item below that best describes a buffer overflow and how is it used against...

Select the item below that best describes a buffer overflow and how is it used against a web server? a. A buffer overflow occurs when more data is sent to an input buffer field than its size. This can be used to overwrite the stack with malicious code and a return pointer to the malicious code. b. A buffer overflow is caused over a network when there is a mismatch in the processing rates between the two entities involved in the communication process. c. A buffer overflow occurs when rows of data are accessed directly in a database table that are larger than the defined row size for the table. d. Most of the time a buffer overflow occurs when a bug is released accidentally in a proprietary operating system.

Solutions

Expert Solution

SOLUTION

What is buffer overflow attack?

A buffer overflow attack occurs when malicious code accidentally or intentionally injects data which is more than the capacity of buffer used to store data.A buffer can be array which stores data in sequential memory location. Extra data exceeds the capacity of the buffer and overwrite some data item stored next to array . The overwrite value may contain a code which can cause a further Denial of Service(DoS) attack in the compromised system.

option a) is closest to buffer overflow problem.

option b) is flow control issue whereby receiver or sender whichever is slow may be overwhelmed by the other with data.

option c) is database table row size error which occurs when the declared table contain size of data field which exceed maximum allowed row size.For example below is one such case in mysql DB.

mysql> CREATE TABLE exam (st VARCHAR(10000), nm VARCHAR(10000), rol VARCHAR(10000), par VARCHAR(10000), e VARCHAR(10000), f VARCHAR(10000), g VARCHAR(6000)) ENGINE=MyISAM CHARACTER SET latin1; ERROR 1118 (42000): Row size too large. The maximum row size for the used table type, not counting BLOBs, is 65535. This includes storage overhead, check the manual. You have to change some columns to TEXT or BLOBs

option d) A reason of bug injection in operating are many.It may be due to poor design of code , not generating proper test case to uncover bug a priori , changed system component among many other.


Related Solutions

How integer overflow can be exploited for buffer overflow attacks?
How integer overflow can be exploited for buffer overflow attacks?
What is an NX (no-execute) bit, and how can it be used to counter buffer overflow...
What is an NX (no-execute) bit, and how can it be used to counter buffer overflow attacks?
Discuss how a stack buffer overflow attack is implemented.
Discuss how a stack buffer overflow attack is implemented.
How can buffer overflows be avoided and what are the steps involved in a buffer overflow...
How can buffer overflows be avoided and what are the steps involved in a buffer overflow exploit? What are some of the C functions susceptible to buffer overflow?
Research on buffer overflow attacks. How do the various types of overflow attacks differ? When did...
Research on buffer overflow attacks. How do the various types of overflow attacks differ? When did they first start to occur? What can they do and not do? What must a programmer do to prevent a buffer overflow? Answer briefly in your own words.
Which of the following statements best describes the concept used to value shares? Select one: a....
Which of the following statements best describes the concept used to value shares? Select one: a. Market price can be expressed as the present value of an infinite stream of dividends assuming a company has an infinite life. b. The present value of the dividend stream and expected capital gain must be calculated separately and then added together. c. The value of an infinite stream of dividends discounted by the current short-term interest rate assuming a company has an infinite...
How format string vulnerabilities can be exploited for buffer overflow attacks?
How format string vulnerabilities can be exploited for buffer overflow attacks?
~Select the statement that best describes the modern evolutionary synthesis.
~Select the statement that best describes the modern evolutionary synthesis. 1) A consensus that describes how evolutionary processes, such as natural selection, can affect a population's genetic makeup, and how this can result in the gradual evolution of populations. 2) The hypothesis that describes how individuals adapt to their environment by utilizing natural selection to alter their DNA quickly to survive extreme conditions. 3) The concept of creating a bigger, stronger, and more fit organism by taking advantage of natural...
Which of the following best describes a lien?​ Select one: a. ​It is an encumbrance or...
Which of the following best describes a lien?​ Select one: a. ​It is an encumbrance or claim against property. b. ​It is the interest paid on a mortgage. c. ​It is a consideration given to the mortgager. d. ​It is the title deed of the property mortgaged.
Which of the following best describes the formula for the total return on a stock? Select...
Which of the following best describes the formula for the total return on a stock? Select one: a. The total return on a share of stock is calculated by adding the dividend yield and the capital gains yield. b. The total return on a share of stock is calculated by dividing the dividend yield and the capital gains yield. c. The total return on a share of stock is calculated by adding the dividend yield and the firm's management expense...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT