Ads
related to: what virus exploited buffer overflows- Run a Virus Scan
Choose your antivirus provider
Find & Remove Any Threats Today
- Malware Removal
The Best Anti-Malware Software
Find & Remove Malware Today
- Top 10 Antivirus 2025
Best 10 Antivirus Software Compared
Review of the Best Virus Protection
- Best Antivirus 2025
Compare antivirus software
Choose your virus protection
- Antivirus Reviews 2025
Best antivirus software review
See who's best rated antivirus 2025
- Top Antivirus 2025
Best virus protection reviews
See Who Is Best Rated Antivirus
- Run a Virus Scan
Search results
Results From The WOW.Com Content Network
It did this by using a long string of the repeated letter 'N' to overflow a buffer, allowing the worm to execute arbitrary code and infect the machine with the worm. Kenneth D. Eichman was the first to discover how to block it, and was invited to the White House for his discovery.
The program exploited a buffer overflow bug in Microsoft's SQL Server and Desktop Engine database products. Although the MS02-039 (CVE-2002-0649) [2] patch had been released six months earlier, many organizations had not yet applied it. The most infected regions were Europe, North America, and Asia (including East Asia and India). [3]
The worm spreads by exploiting a buffer overflow discovered by the Polish security research group Last Stage of Delirium [5] in the DCOM RPC service on the affected operating systems, for which a patch had been released one month earlier in MS03-026 [6] (CVE-2003-0352) and later in MS03-039. [7]
Sasser was created on April 30, 2004. [2] This worm was named Sasser because it spreads by exploiting a buffer overflow in the component known as LSASS (Local Security Authority Subsystem Service) on the affected operating systems.
The worm exploited several vulnerabilities of targeted systems, including: A hole in the debug mode of the Unix sendmail program; A buffer overflow or overrun hole in the finger network service; The transitive trust enabled by people setting up network logins with no password requirements via remote execution (rexec) with Remote Shell (rsh ...
Visualization of a software buffer overflow. Data is written into A, but is too large to fit within A, so it overflows into B.. In programming and information security, a buffer overflow or buffer overrun is an anomaly whereby a program writes data to a buffer beyond the buffer's allocated memory, overwriting adjacent memory locations.