Ten Buffer Overflow Attacks

Now that you have a detailed understanding of how buffer overflow attacks work and the different variations, we will cover ten different buffer overflow exploits. The first five will be covered in detail; the remaining five will be brief overviews because they are relatively new exploits:

  • NetMeeting Buffer Overflow

  • Outlook Buffer Overflow

  • Linuxconf Buffer Overflow

  • ToolTalk Buffer Overflow

  • IMPAD Buffer Overflow

  • AOL Instant Messenger Buffer Overflow

  • AOL Instant Messenger BuddyIcon Buffer Overflow

  • Windows 2000 ActiveX Control Buffer Overflow

  • IIS 4.0/5.0 Phone Book Server Buffer Overflow

  • SQL Server 2000 Extended Stored Procedure Buffer Overflow

These exploits are performed on all systems from UNIX to Windows and include several ...

Get Hackers Beware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.