A buffer overflow is a software flaw that is used by attackers of network based applications. Buffer overflows can occur, and be exploited, in applications that have been coded without correct logic to handle memory operations. Often this results in data being written past the end of a designated memory block. Data that is written into memory in regions where it shouldn’t be, can include malicious code that gets executed. This can give access to normally protected data. Modern security infrastructure can be used to mitigate the threat of buffer Overflow attacks. For example, deploying web application firewalls, and using network security functions like Deep Packet Inspection to identify and block malicious payloads.
Progress, Telerik, Ipswitch, Chef, Kemp, Flowmon, MarkLogic, Semaphore and certain product names used herein are trademarks or registered trademarks of Progress Software Corporation and/or one of its subsidiaries or affiliates in the U.S. and/or other countries. See
Trademarks for appropriate markings.