Chapter 10. Exploits, Vulnerabilities, and Buffer Overflow Attacks

“ Greater is our terror of the unknown.”

—Titus Livius

10.1 Introduction

Exploits, vulnerabilities1, and buffer overflow techniques2 have long been used by malicious hackers and virus writers. Until recently, however, these techniques were not commonplace. The CodeRed3, 4 worm was a major shock to the antivirus industry because it was the first worm that spread not as a file but solely in memory by utilizing a buffer overflow in Microsoft IIS. Many antivirus companies were unable to provide protection against CodeRed, while other companies with a wider focus on security could provide solutions—to the relief of end users.

Usually new techniques are picked up and used by copycat ...

Get Art of Computer Virus Research and Defense, The now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.