Matches in DBpedia 2016-04 for { <http://wikidata.dbpedia.org/resource/Q16848739> ?p ?o }
Showing triples 1 to 33 of
33
with 100 triples per page.
- Q16848739 subject Q5539407.
- Q16848739 subject Q6812727.
- Q16848739 subject Q7012863.
- Q16848739 abstract "In computer security and programming, a buffer over-read is an anomaly where a program, while reading data from a buffer, overruns the buffer's boundary and reads (or tries to read) adjacent memory. This is a special case of violation of memory safety.Buffer over-reads can be triggered, as in the Heartbleed bug, by maliciously crafted inputs that are designed to exploit a lack of bounds checking to read parts of memory not intended to be accessible. They may also be caused by programming errors alone. Buffer over-reads can result in erratic program behavior, including memory access errors, incorrect results, a crash, or a breach of system security. Thus, they are the basis of many software vulnerabilities and can be maliciously exploited to access privileged information.Programming languages commonly associated with buffer over-reads include C and C++, which provide no built-in protection against using pointers to access data in any part of virtual memory, and which do not automatically check that reading data from a block of memory is safe; respective examples are attempting to read more elements than contained in an array, or failing to append a trailing terminator to a null-terminated string. Bounds checking can prevent buffer over-reads, while fuzz testing can help detect them.".
- Q16848739 wikiPageExternalLink TSL20140102-03.
- Q16848739 wikiPageExternalLink bug.php?id=66060.
- Q16848739 wikiPageWikiLink Q1099515.
- Q16848739 wikiPageWikiLink Q11287.
- Q16848739 wikiPageWikiLink Q118155.
- Q16848739 wikiPageWikiLink Q1189053.
- Q16848739 wikiPageWikiLink Q15777.
- Q16848739 wikiPageWikiLink Q16244272.
- Q16848739 wikiPageWikiLink Q17149583.
- Q16848739 wikiPageWikiLink Q179550.
- Q16848739 wikiPageWikiLink Q189401.
- Q16848739 wikiPageWikiLink Q19423.
- Q16848739 wikiPageWikiLink Q2407.
- Q16848739 wikiPageWikiLink Q331911.
- Q16848739 wikiPageWikiLink Q333501.
- Q16848739 wikiPageWikiLink Q3510521.
- Q16848739 wikiPageWikiLink Q40056.
- Q16848739 wikiPageWikiLink Q4080983.
- Q16848739 wikiPageWikiLink Q42848.
- Q16848739 wikiPageWikiLink Q5295.
- Q16848739 wikiPageWikiLink Q5539407.
- Q16848739 wikiPageWikiLink Q631425.
- Q16848739 wikiPageWikiLink Q6812727.
- Q16848739 wikiPageWikiLink Q7012863.
- Q16848739 wikiPageWikiLink Q736866.
- Q16848739 wikiPageWikiLink Q80006.
- Q16848739 wikiPageWikiLink Q9143.
- Q16848739 comment "In computer security and programming, a buffer over-read is an anomaly where a program, while reading data from a buffer, overruns the buffer's boundary and reads (or tries to read) adjacent memory. This is a special case of violation of memory safety.Buffer over-reads can be triggered, as in the Heartbleed bug, by maliciously crafted inputs that are designed to exploit a lack of bounds checking to read parts of memory not intended to be accessible.".
- Q16848739 label "Buffer over-read".