Buffer Overflow Attack

13th May 2020 | Cybrary Buffer Overflow Attack


Buffer Overflow Attack happens when a program tries to fill a block of memory (a memory buffer) with more data than a buffer is supposed to hold. Buffers are essentially the areas of storage that temporarily hold data while it is being transferred from one location to another. 

Buffer Overflow Attacks

When a hacker sends malicious inputs to a vulnerable application, they can force the application to execute malicious code to take control of the machine or crash the system. Buffer overflow vulnerabilities are known to be caused by programmer mistakes that are easy to understand but much harder to avoid and protect against.

Attackers exploit buffer overflow issues by overwriting the memory of an application, changing the execution path of the program, triggering a response that damages files or exposes sensitive information. For example, an attacker may introduce extra code, sending new instructions to the application to gain privileged access to your IT system.

Source: NetSparker, Imperva

Additional Reading:

  1. Google Squashes High-Severity Flaws in Chrome Browser
  2. Five (5) Buffer Overflow Vulnerabilities in Popular Apps

Related Terms:

What should you do as an SMB?

Buffer overflow prevention pertains first and foremost to businesses developing software.  Train developers on the OWASP top 10 mistakes in coding to help them understand the importance of boundary checks and input validation in the code they write. Most static code scanning solutions on the market test for input validation and will alert you if you do not have this set right. Always build static and dynamic code scanning into your software development lifecycle.

For non-development businesses, you need to pay attention to vulnerabilities that may be disclosed in the COTS software you purchase and use at your business. Sometimes they will have buffer overflow vulnerabilities which can lead to compromise of your computing systems. Always monitor your vendors security advisories and apply patches in a timely fashion to ensure your software environment is safe and secure from these and many other vulnerabilities.

Buffer overflow attacks are easily preventable whether in other peoples code or your own. Pay attention to this and avoid a costly mistake.

To learn more about Buffer Overflow Attacks, watch this short 4 minute video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more
Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more
CyberHoot Newsletter – May 2025

CyberHoot Newsletter – May 2025

Welcome to CyberHoot's May Newsletter! This month, we're spotlighting key developments in the cyber threat...

Read more