When.com Web Search

  1. Ads

    related to: what virus exploited buffer overflows
    • Run a Virus Scan

      Choose your antivirus provider

      Find & Remove Any Threats Today

    • Malware Removal

      The Best Anti-Malware Software

      Find & Remove Malware Today

Search results

  1. Results From The WOW.Com Content Network
  2. Code Red (computer worm) - Wikipedia

    en.wikipedia.org/wiki/Code_Red_(computer_worm)

    It did this by using a long string of the repeated letter 'N' to overflow a buffer, allowing the worm to execute arbitrary code and infect the machine with the worm. Kenneth D. Eichman was the first to discover how to block it, and was invited to the White House for his discovery.

  3. SQL Slammer - Wikipedia

    en.wikipedia.org/wiki/SQL_Slammer

    The program exploited a buffer overflow bug in Microsoft's SQL Server and Desktop Engine database products. Although the MS02-039 (CVE-2002-0649) [2] patch had been released six months earlier, many organizations had not yet applied it. The most infected regions were Europe, North America, and Asia (including East Asia and India). [3]

  4. Blaster (computer worm) - Wikipedia

    en.wikipedia.org/wiki/Blaster_(computer_worm)

    The worm spreads by exploiting a buffer overflow discovered by the Polish security research group Last Stage of Delirium [5] in the DCOM RPC service on the affected operating systems, for which a patch had been released one month earlier in MS03-026 [6] (CVE-2003-0352) and later in MS03-039. [7]

  5. Sasser (computer worm) - Wikipedia

    en.wikipedia.org/wiki/Sasser_(computer_worm)

    Sasser was created on April 30, 2004. [2] This worm was named Sasser because it spreads by exploiting a buffer overflow in the component known as LSASS (Local Security Authority Subsystem Service) on the affected operating systems.

  6. Morris worm - Wikipedia

    en.wikipedia.org/wiki/Morris_worm

    The worm exploited several vulnerabilities of targeted systems, including: A hole in the debug mode of the Unix sendmail program; A buffer overflow or overrun hole in the finger network service; The transitive trust enabled by people setting up network logins with no password requirements via remote execution (rexec) with Remote Shell (rsh ...

  7. Buffer overflow - Wikipedia

    en.wikipedia.org/wiki/Buffer_overflow

    Visualization of a software buffer overflow. Data is written into A, but is too large to fit within A, so it overflows into B.. In programming and information security, a buffer overflow or buffer overrun is an anomaly whereby a program writes data to a buffer beyond the buffer's allocated memory, overwriting adjacent memory locations.