A new version of the old buffer overflow problem is appearing: a version that is not protected by the architectural approach of inhibiting stack execution. The first hacking “magic wand” I saw was the buffer overflow exploit used by Robert Morris in the original Internet Worm back in the late 1980s. Morris’s father worked for the National Security Agency and noticed that many programs in C had two interesting characteristics. First, variables within functions were created and accessed within a structured portion of memory called the stack. Second, array variables used as program buffers were not checked before further characters were added to them. Full Story
About OODA Analyst
OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments.