Of particular note, SP1 provides better support for consuming WSDL documents, Data Execution prevention and protection from security issues such as buffer overruns.
Until the late 1990s, major operating systems did not offer any protection against these attacks; Microsoft Windows provided no buffer-overrun protections until 2004.
造成这一漏洞的直接原因是,Sendmail的一个安全检测是有缺陷的,可以发生缓冲区溢出。
The immediate cause of the vulnerability was that one of Sendmail's security checks was flawed, permitting a buffer overflow.
成功利用漏洞可能会使攻击者在受影响的设备上造成缓冲区溢出,这可能会产生以下影响:.
A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts.
Data Execution Prevention(DEP): Support for the No Execute(NX) bit which helps to prevent buffer overflow exploits that are often the attack vector of Windows Server exploits.
非执行堆栈大多数应用程序不需要执行任何在堆栈上,所以一个明显的防御缓冲区溢出攻击是使栈非执行。
Most applications never need to execute anything on the stack, so an obvious defense against buffer overflow exploits is to make the stack nonexecutable.
以一个先前的专栏中我们已经论及了一个常见的错误:缓冲区溢出(参阅以获得安全编程先前部分的链接)。
We have already covered one common mistake, buffer overflows, in a previous column(see Related topics for links to previous installments of Secure programmer).
English
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt