Examples of using Buffer overflows in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Be careful with buffer overflows!
Buffer overflows allowing local root access.
PostgreSQL-- Integer and buffer overflows.
Buffer overflows" are therefore not to be expected.
SuperProbe(of XFree86) contains a number of buffer overflows.
Sep 2003 DSA-392 webfs- buffer overflows, file and directory exposure.
A description of three new techniques in OpenBSD to counter buffer overflows.
Aug 2003 DSA-364 man-db- buffer overflows, arbitrary command execution.
This makes use of features of the SPARC architecture to help prevent exploitation of buffer overflows.
Syslog-ng contains buffer overflows in its macro expansion routines.
It was discoveredthat Icinga, a host and network monitoring system, contains several buffer overflows in the history.
Aug 2002 DSA-148 hylafax- buffer overflows and format string vulnerabilities.
Multiple integer overflows make it easier for attackers to perform memory-based attacks such as buffer overflows.
Several buffer overflows in ePerl were discovered that could lead to a remote root exploit in some setups.
Affected versions of the mod_frontpage port contains several exploitable buffer overflows in the fpexec wrapper, which is installed setuid root.
Integer overflows, buffer overflows and other implementation errors may lead to the execution of arbitrary code or denial of service.
In libpng two potential possibilities for heap based buffer overflows and therefore remote code execution have been found.
Several buffer overflows were found in'Skype' software, which allows a remote attacker to execute arbitrary code or cause denial-of-service condition.
An attacker might be able to execute arbitrary code against the Oracle database by exploiting buffer overflows in this executable.
Now cFosSpeed detects such buffer overflows early and prevents packet loss by continually adjusting the download speed.
Therefore it is important, to let safety aspects slip into coding,stick to certain rules and to test programs for bugs like buffer overflows.
These vulnerabilities include buffer overflows, insecure default settings, failures to enforce access controls, and failure to validate input.
It would have been a target of choice for this kind of attack, the availability of free software sourcemaking the search of vulnerabilities very simple buffer overflows, for instance.
As with the local variants of such bugs, buffer overflows in network programs, when successfully exploited, are mostly used to obtain root permissions.
GCC compiler and GLIBC C library from Fedora Core 4 onwards has gained a feature called"FORTIFY_SOURCE" that will detect andprevent a subset of the buffer overflows before they can do damage.
Marcel Holtman discovered multiple buffer overflows in the Bluetooth subsystem which can be used to trigger a remote DoS(crash) and potentially execute arbitrary code.
Buffer overflows in the icecast server allow remote attackers to execute arbitrary code via a long HTTP GET request, as well as allowing denial of service attacks.
These buffer overflows may be triggered when connecting to a malicious server, or by an active attacker in the network path between the client and server.
Some buffer overflows and other bugs were found in the openldap server and in the openldap client libraries, so remote attackers might get access to a vulnerable system.
Buffer overflows in mail programs occur in handling the message headers and attachment headers, which is information the email client needs to process in order to know details about the message and what to do with it.