Questions about this topic? Sign up to ask in the talk tab.
User:Xochipilli/Integer Overflow Vulnerability
From NetSec
< User:Xochipilli
Revision as of 01:57, 16 May 2012 by SerenaValdivia (Talk | contribs) (Created page with "=Overview= {{Main|Bitwise_math#Overflows}} An integer overflow or underflow occurs when an integer exceeds its bounds (MIN_INT and MAX_INT for signed integers). =Exploitation= I...")
Overview
- Main article: Bitwise_math#Overflows
An integer overflow or underflow occurs when an integer exceeds its bounds (MIN_INT and MAX_INT for signed integers).
Exploitation
Integer overflow is expected behavior, however, it can lead to exploitation in certain circumstances. For example, an integer may be casted to a smaller type after the application validates it. If that integer is then used to allocate or copy memory, it could lead to a Buffer Overflow or Denial of Service (DoS) attack. Consider the following trivial example: