logo

Cryptography: Buffer Overflow Threats and Mitigation Techniques

   

Added on  2023-05-23

7 Pages1251 Words249 Views
1Cryptography
Cryptography
Student Name
University Name

2Cryptography
Table of Content
Solution 1.......................................................................................................................3
Threat Profile...........................................................................................................3
Solution 2.......................................................................................................................5
Part d.......................................................................................................................5
Part e........................................................................................................................5
Part g.......................................................................................................................5
References......................................................................................................................7
Solution 1
Buffer Overflow is a recent security vulnerability. Confidentiality, integrity, and
availability was impacted because of this bug.
Threat Profile
Threat International Score:
Vulnerability DB Base International Score: 5.1
Vulnerability DB Temp International Score: 5.1
Vulnerability DB Dependability: Very High
Law: Federal Information protection or security law and this Act was designed to
secure or protect data from attackers at the time of buffer overflow. Static analysis
strategies and legal rules & regulations executed to find usual coding issues that might
expose buffer overflow.

3Cryptography
Fig 1: Buffer Overflow
Image Source:ai2-s2-public.s3.aws.com
Threat list: Hinders security of user’s data, format string assaults, unauthorized
control on the execution of programs & processes, unauthorized modification of inner
variables and crashing of the processes.
Systems it attacks: Buffer overflows vulnerability affecting widely utilized server
products and also represent some significant risks or threats to users of such
applications. Recently several buffer overflow threats were disclosed in several
SCADA constituents. Considering that several cyber-attacks or assaults against
SCADA is highly increased and these buffer overflow security vulnerabilities will
seriously exploit with huge frequency ("Security vulnerability in sendmail", 1999).
Buffer overflow assaults are particularly very dangerous and their web servers,
desktop applications, as well as web applications.
How Buffer overflow attack: Attacker sends or transmit data to any application
which store that data in a very undersized batch buffer and causing the huge
overwriting of the data or information on a call batch or stack considering the
function’s turning pointer. Therefore in this manner attacker is capable to run all its

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
THE WEB SERVER VULNERABILITIES.
|7
|1313
|27

Report on Ethical Hacking and Defence
|6
|952
|133

Contemporary World Application 2022
|10
|541
|10

Advanced Digital Forensics: Shellcode, Exploits, and Intrusion Detection
|12
|2801
|294

Cyber Defence For Business Analysis Report
|11
|1814
|11

Report | Buffer Overflow Attack
|6
|1023
|49