Request a Demo Contact Us
Bugcrowd Achieves Global CREST Accreditation For Pen Testing
Learn More

Buffer Overflow Attack

Buffer overflow attack is a cyberattack method in which the attacker exploits an application's security by deliberately overwriting the application's memory.

Buffer overflow attack is a cyberattack method in which the attacker exploits an application’s security by deliberately overwriting the application’s memory. A buffer overflow is one of the most known forms of software vulnerabilities. In a buffer overflow attack, a hacker most commonly manipulates the application’s memory or exploits mistaken assumptions regarding the composition or size of data. Buffer overflow attacks can be challenging to discover and even more challenging to exploit. Despite the challenge, buffer overflow attacks remain common. The two primary forms of buffer overflow attacks are stack-based buffer overflows and heap-based attacks. Stack-based buffer overflow attacks are more common and leverage stack memory that only exists at the time of a function’s execution. Heap-based attacks are more advanced and involve flooding the memory space allocated for a program.

Want to learn more? Check out our FREE Bugcrowd University to sharpen your hacking skills.

Organizations the world over need your help! Join our researcher community to connect with hundreds of organization programs focused on finding their security vulnerabilities. Our vast directory includes programs for all skill levels, across many industries and from around the world.

Get started with Bugcrowd

Hackers aren’t waiting, so why should you? See how Bugcrowd can quickly improve your security posture.