Class: sec:BufferOverflow

•owl:Thing
        •sec:Threat
                •sec:ActiveAttack
                        •sec:MalformedInput
                                •sec:BufferOverflow

Super Classes

sec:threatens SOME (sec:_Integrity AND sec:_DataOnVolatileMedia)
sec:threatens ONLY (sec:_Integrity AND sec:_DataOnVolatileMedia)
sec:MalformedInput

Annotations

dc:descriptionBuffer overflow happens when input or intermediate results exceed the buffer size. (Phoha) A program writes data beyond the allocated end of a buffer in memory. Buffer overflows usually arise as a consequence of a bug and the use of languages such as C or C++ that are not "memory-safe". One consequence of the overflow is that valid data can be overwritten as a result. (Wikipedia) A method of overloading a predefined amount of space in a buffer, which can potentially overwrite and corrupt data in memory. (www.evestigations.com/html/glossary.html)

Abstract Syntax

Class(sec:BufferOverflow partial restriction(sec:threatens someValuesFrom(intersectionOf(sec:_Integrity
                                                                                        sec:_DataOnVolatileMedia)))
                                restriction(sec:threatens allValuesFrom(intersectionOf(sec:_Integrity
                                                                                       sec:_DataOnVolatileMedia)))
                                sec:MalformedInput)

Usage

Class Description/Definition (Necessary Conditions)

sec:HeapOverflow, sec:IntegerOverflow, sec:PingOfDeath, sec:StackOverflow
Generated with OWLDoc