Salut! ( Hi monks :-) C'est un bonne question! Here is my answer with not going into details... but you can find very nice docs on how to exploit this "features".
When data is passed over buffer size it is never sure where it could go: a) somewhere where causes memory problems, malfunction, and finally crash -> one step from getting a server down. b) any place in your memory where data can be overwritten and alter the behaviour of your application -> one step from openning a door in a service. c) Peut ettre qq conais autres possibilites? Salut, Pep Serrano. > > Simple curiosit�... > Je re�ois souvent de la liste s�curit� Mandrake des messages ou il est > question de "buffer overflow", du type de celui-ci: > > En quoi un buffer overflow est-il dangereux? -- http://www-internal.alphanet.ch/linux-leman/ avant de poser une question. Ouais, pour se d�sabonner aussi.
