•owl:Thing |
•sec:Threat |
•sec:ActiveAttack |
•sec:MalformedInput |
•sec:BufferOverflow |
sec:threatens SOME (sec:_Integrity AND sec:_DataOnVolatileMedia) |
sec:threatens ONLY (sec:_Integrity AND sec:_DataOnVolatileMedia) |
sec:MalformedInput |
dc:description | Buffer overflow happens when input or intermediate results exceed the buffer size. (Phoha) A program writes data beyond the allocated end of a buffer in memory. Buffer overflows usually arise as a consequence of a bug and the use of languages such as C or C++ that are not "memory-safe". One consequence of the overflow is that valid data can be overwritten as a result. (Wikipedia) A method of overloading a predefined amount of space in a buffer, which can potentially overwrite and corrupt data in memory. (www.evestigations.com/html/glossary.html) |
Class(sec:BufferOverflow partial restriction(sec:threatens someValuesFrom(intersectionOf(sec:_Integrity sec:_DataOnVolatileMedia))) restriction(sec:threatens allValuesFrom(intersectionOf(sec:_Integrity sec:_DataOnVolatileMedia))) sec:MalformedInput)