Return-to-libc attack
id:
return-to-libc-attack-298-661750
title:
Return-to-libc attack
text:
A "return-to-libc" attack is a computer security attack usually starting with a buffer overflow in which a subroutine return address on a call stack is replaced by an address of a subroutine that is already present in the process executable memory, bypassing the no-execute bit feature and ridding the attacker of the need to inject their own code. The first example of this attack in the wild was contributed by Alexander Peslyak on the Bugtraq mailing list in 1997. On POSIX-compliant operating sys
brand slug:
wiki
category slug:
encyclopedia
description:
original url:
https://en.wikipedia.org/wiki/Return-to-libc_attack
date created:
date modified:
2022-06-26T05:20:47Z
main entity:
{"identifier":"Q13427559","url":"https://www.wikidata.org/entity/Q13427559"}
image:
fields total:
13
integrity:
13