aboutsummaryrefslogtreecommitdiff
path: root/documentation/content/en/books/developers-handbook/secure/_index.adoc
diff options
context:
space:
mode:
Diffstat (limited to 'documentation/content/en/books/developers-handbook/secure/_index.adoc')
-rw-r--r--documentation/content/en/books/developers-handbook/secure/_index.adoc4
1 files changed, 2 insertions, 2 deletions
diff --git a/documentation/content/en/books/developers-handbook/secure/_index.adoc b/documentation/content/en/books/developers-handbook/secure/_index.adoc
index 738a18988c..a871193a5b 100644
--- a/documentation/content/en/books/developers-handbook/secure/_index.adoc
+++ b/documentation/content/en/books/developers-handbook/secure/_index.adoc
@@ -69,7 +69,7 @@ UNIX(R) processes do not execute synchronously so logical operations are rarely
[[secure-bufferov]]
== Buffer Overflows
-Buffer Overflows have been around since the very beginnings of the von Neumann crossref:bibliography[cod,1] architecture.
+Buffer Overflows have been around since the very beginnings of the von Neumann crossref:bibliography[COD,1] architecture.
They first gained widespread notoriety in 1988 with the Morris Internet worm.
Unfortunately, the same basic attack remains effective today.
By far the most common type of buffer overflow attack is based on corrupting the stack.
@@ -81,7 +81,7 @@ This stack frame consists of the arguments passed to the function as well as a d
The "stack pointer" is a register that holds the current location of the top of the stack.
Since this value is constantly changing as new values are pushed onto the top of the stack,
many implementations also provide a "frame pointer" that is located near the beginning of a stack frame so that local variables can more easily be addressed relative to this value.
-crossref:bibliography[cod,1] The return address for function calls is also stored on the stack, and this is the cause of stack-overflow exploits since overflowing a local variable in a function can overwrite the return address of that function, potentially allowing a malicious user to execute any code he or she wants.
+crossref:bibliography[COD,1] The return address for function calls is also stored on the stack, and this is the cause of stack-overflow exploits since overflowing a local variable in a function can overwrite the return address of that function, potentially allowing a malicious user to execute any code he or she wants.
Although stack-based attacks are by far the most common,
it would also be possible to overrun the stack with a heap-based (malloc/free) attack.