skip to Main Content
This website use cookies which are necessary to its functioning and required to achieve the purposes illustrated in the privacy policy. To learn more or withdraw consent please click on Learn More. By continued use of this website you are consenting to our use of cookies.


Buffer Overflow Attack

Buffer overflow attack is a cyberattack method in which the attacker exploits an application's security by deliberately overwriting the application's memory.

Buffer overflow attack is a cyberattack method in which the attacker exploits an application’s security by deliberately overwriting the application’s memory. A buffer overflow is one of the most known forms of software vulnerabilities. In a buffer overflow attack, a hacker most commonly manipulates the application’s memory or exploits mistaken assumptions regarding the composition or size of data. Buffer overflow attacks can be challenging to discover and even more challenging to exploit. Despite the challenge, buffer overflow attacks remain common. The two primary forms of buffer overflow attacks are stack-based buffer overflows and heap-based attacks. Stack-based buffer overflow attacks are more common and leverage stack memory that only exists at the time of a function’s execution. Heap-based attacks are more advanced and involve flooding the memory space allocated for a program.

Want to learn more? Check out our FREE Bugcrowd University to sharpen your hacking skills.

Organizations the world over need your help! Join our researcher community to connect with hundreds of organization programs focused on finding their security vulnerabilities. Our vast directory includes programs for all skill levels, across many industries and from around the world.

Back To Top