The most common buffer overflow where a local buffer allocated on the stack is overflown with data so that eventually the return address is overwritten. This can redirect the program flow to attack code. (adapted from Wil05) |
•owl:Thing |
•sec:Threat |
•sec:ActiveAttack |
•sec:MalformedInput |
•sec:BufferOverflow |
•sec:StackOverflow |
•ReturnAddressOverflow |
sec:threatens ONLY _StackReturnAddress |
sec:threatens SOME _StackReturnAddress |
sec:StackOverflow |
Class(ReturnAddressOverflow partial restriction(sec:threatens allValuesFrom(_StackReturnAddress)) restriction(sec:threatens someValuesFrom(_StackReturnAddress)) sec:StackOverflow)