Deck 10: Buffer Overflow

Full screen (f)
exit full mode
Question
Buffer overflow attacks result from careless programming in
applications.
Use Space or
up arrow
down arrow
to flip the card.
Question
The buffer overflow type of attack is one of the least commonly seen
attacks.
Question
The first widely used occurrence of the buffer overflow attack was the _______.

A)Code Red Worm
B)Morris Internet Worm
C)Sasser Worm
D)Slammer Worm
Question
The x86 Assembly Language Instruction NOP means _______.

A)no operation or do nothing instruction
B)call function at addr
C)software interrupt to access operating system function
D)no push value onto the stack
Question
Several of the items in the CWE/SANS Top 25 Most Dangerous
Software Errors list,Risky Resource Management category,are buffer
overflow variants.
Question
The attacker is able to precisely specify the starting address of the
instructions in the shellcode.
Question
A ______ is a structure where data are usually saved on the stack.

A)guard page
B)stack frame
C)heap
D)NOP sled
Question
A stack buffer overflow attack is also referred to as ______.

A)stack smashing
B)stack framing
C)buffer overrunning
D)heap overflowing
Question
Shellcode is not specific to a particular processor architecture.
Question
A stack overflow can result in some form of denial-of-service attack on
a system.
Question
A _______ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-size buffer.

A)shellcode
B)program overflow
C)buffer overflow
D)library function
Question
C's designers placed much more emphasis on space efficiency and
performance considerations than on type safety.
Question
The JAVA programming language is extremely vulnerable to buffer
overflows.
Question
Buffer overflows can be found in a wide variety of programs.
Question
A successful buffer overflow attack results in the loss of the function
or service the attacked program provided.
Question
The only consequence of a buffer overflow attack is the possible
corruption of data used by the program.
Question
The possibility of overwriting the saved frame pointer and return
address forms the core of a stack overflow attack.
Question
To exploit any type of buffer overflow the attacker needs to understand
how that buffer will be stored in the processes memory.
Question
The responsibility is placed on the assembly language programmer to
ensure that the correct interpretation is placed on any saved data value.
Question
An effective method for protecting programs against classic stack
overflow attacks is to instrument the function entry and exit code to
setup and then check its sack frame for any evidence of corruption.
Question
_______ defenses aim to detect and abort attacking existing programs.
Question
One of the restrictions on the content of shellcode is that it has to be _______,which means that it cannot contain any absolute address referring to itself.
Question
A ________ is a condition where more input is placed into a buffer or data holding area than the capacity allocated and thus overwrites other information.
Question
_______ was one of the earliest operating systems written in a high-level language.
Question
The function of the _______ was to transfer control to a user command line interpreter that gave access to any program available on the system with the privileges of the attacked program.
Question
The _________ aims to provide useful information to people who perform penetration testing,IDS signature development,and exploit research.

A)Metasploit Project
B)Manhattan Project
C)Levy Project
D)RAD Project
Question
_______ defenses involve changes to the memory management of the virtual address space of processes that act to either alter the properties of regions of memory or to make predicting the location of target buffers sufficiently difficult to thwart many types of attacks.

A)Buffer
B)Position independent
C)Run-time
D)Compile-time
Question
At the basic machine level,all of the data manipulated by machine instructions executed by the computer processor are stored in either the processor's registers or in ________.
Question
Memory is requested from the ______ by programs for use in dynamic data structures,such as linked lists of records.

A)shell
B)heap
C)address space
D)ROM
Question
______ defenses aim to harden programs to resist attacks in new programs.
Question
A runtime technique that can be used is to place ________ between critical regions of memory in a processes address space.

A)guard pages
B)library functions
C)shellcodes
D)MMUs
Question
The _______ exploited a buffer overflow in Microsoft SQL Server 2000.

A)Morris Internet Worm
B)Code Red Worm
C)Sasser Worm
D)Slammer Worm
Question
_________ aim to prevent or detect buffer overflows by instrumenting programs when they are compiled.

A)Stack buffers
B)Guard pages
C)Compile-time defenses
D)Library functions
Question
In 2004 the ________ exploited a buffer overflow in Microsoft Windows 2000/XP Local Security Authority Subsystem Service.

A)Morris Internet Worm
B)Code Red Worm
C)Sasser Worm
D)Slammer Worm
Question
Stackshield,Return Address Defender and ________ are GCC compiler extensions that insert additional function entry and exit code.
Question
Randomizing the allocation of memory on the heap makes the possibility of predicting the address of targeted buffers extremely difficult,thus thwarting the successful execution of some __________ attacks.

A)vulnerability
B)heap overflow
C)MMU
D)stack overflow
Question
________ involve buffers located in the program's global (or static)data area.

A)Heap overflows
B)Stack buffer overflows
C)Position overflows
D)Global Data Area Overflows
Question
The _________ project produces a free,multiplatform 4.4BSD-based UNIX-like operating system.
Question
A _______ overflow occurs when the targeted buffer is located on the stack,usually as a local variable in a function's stack frame.
Question
An essential component of many buffer overflow attacks is the transfer of execution to code,known as _______,supplied by the attacker and often saved in the buffer being overflowed.

A)NOP code
B)stack code
C)heap code
D)shellcode
Question
A _________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-sized buffer and consequently overwrites adjacent memory locations.
Question
In 1996 ________ published "Smashing the Stack for Fun and Profit" in Phrack magazine,giving a step-by-step introduction to exploiting stack-based buffer overflow vulnerabilities.
Question
________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred,but due to a coding error,allows just one more byte to be copied than there is space available.
Question
The attacker can specify the return address used to enter code as a location somewhere in the run of NOPs,which is called a NOP ______.
Question
_______ can be placed between stack frames or between different allocations on the heap to provide further protection against stack and heap overflow attacks,but at cost in execution time supporting the large number of page mappings necessary.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Buffer Overflow
1
Buffer overflow attacks result from careless programming in
applications.
True
2
The buffer overflow type of attack is one of the least commonly seen
attacks.
False
3
The first widely used occurrence of the buffer overflow attack was the _______.

A)Code Red Worm
B)Morris Internet Worm
C)Sasser Worm
D)Slammer Worm
B
4
The x86 Assembly Language Instruction NOP means _______.

A)no operation or do nothing instruction
B)call function at addr
C)software interrupt to access operating system function
D)no push value onto the stack
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Several of the items in the CWE/SANS Top 25 Most Dangerous
Software Errors list,Risky Resource Management category,are buffer
overflow variants.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
The attacker is able to precisely specify the starting address of the
instructions in the shellcode.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
A ______ is a structure where data are usually saved on the stack.

A)guard page
B)stack frame
C)heap
D)NOP sled
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
A stack buffer overflow attack is also referred to as ______.

A)stack smashing
B)stack framing
C)buffer overrunning
D)heap overflowing
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Shellcode is not specific to a particular processor architecture.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
A stack overflow can result in some form of denial-of-service attack on
a system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
A _______ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-size buffer.

A)shellcode
B)program overflow
C)buffer overflow
D)library function
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
C's designers placed much more emphasis on space efficiency and
performance considerations than on type safety.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
The JAVA programming language is extremely vulnerable to buffer
overflows.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Buffer overflows can be found in a wide variety of programs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
A successful buffer overflow attack results in the loss of the function
or service the attacked program provided.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
The only consequence of a buffer overflow attack is the possible
corruption of data used by the program.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
The possibility of overwriting the saved frame pointer and return
address forms the core of a stack overflow attack.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
To exploit any type of buffer overflow the attacker needs to understand
how that buffer will be stored in the processes memory.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
The responsibility is placed on the assembly language programmer to
ensure that the correct interpretation is placed on any saved data value.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
An effective method for protecting programs against classic stack
overflow attacks is to instrument the function entry and exit code to
setup and then check its sack frame for any evidence of corruption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
_______ defenses aim to detect and abort attacking existing programs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
One of the restrictions on the content of shellcode is that it has to be _______,which means that it cannot contain any absolute address referring to itself.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
A ________ is a condition where more input is placed into a buffer or data holding area than the capacity allocated and thus overwrites other information.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
_______ was one of the earliest operating systems written in a high-level language.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
The function of the _______ was to transfer control to a user command line interpreter that gave access to any program available on the system with the privileges of the attacked program.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
The _________ aims to provide useful information to people who perform penetration testing,IDS signature development,and exploit research.

A)Metasploit Project
B)Manhattan Project
C)Levy Project
D)RAD Project
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
_______ defenses involve changes to the memory management of the virtual address space of processes that act to either alter the properties of regions of memory or to make predicting the location of target buffers sufficiently difficult to thwart many types of attacks.

A)Buffer
B)Position independent
C)Run-time
D)Compile-time
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
At the basic machine level,all of the data manipulated by machine instructions executed by the computer processor are stored in either the processor's registers or in ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
Memory is requested from the ______ by programs for use in dynamic data structures,such as linked lists of records.

A)shell
B)heap
C)address space
D)ROM
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
______ defenses aim to harden programs to resist attacks in new programs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
A runtime technique that can be used is to place ________ between critical regions of memory in a processes address space.

A)guard pages
B)library functions
C)shellcodes
D)MMUs
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The _______ exploited a buffer overflow in Microsoft SQL Server 2000.

A)Morris Internet Worm
B)Code Red Worm
C)Sasser Worm
D)Slammer Worm
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
_________ aim to prevent or detect buffer overflows by instrumenting programs when they are compiled.

A)Stack buffers
B)Guard pages
C)Compile-time defenses
D)Library functions
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
In 2004 the ________ exploited a buffer overflow in Microsoft Windows 2000/XP Local Security Authority Subsystem Service.

A)Morris Internet Worm
B)Code Red Worm
C)Sasser Worm
D)Slammer Worm
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
Stackshield,Return Address Defender and ________ are GCC compiler extensions that insert additional function entry and exit code.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
Randomizing the allocation of memory on the heap makes the possibility of predicting the address of targeted buffers extremely difficult,thus thwarting the successful execution of some __________ attacks.

A)vulnerability
B)heap overflow
C)MMU
D)stack overflow
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
________ involve buffers located in the program's global (or static)data area.

A)Heap overflows
B)Stack buffer overflows
C)Position overflows
D)Global Data Area Overflows
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The _________ project produces a free,multiplatform 4.4BSD-based UNIX-like operating system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
A _______ overflow occurs when the targeted buffer is located on the stack,usually as a local variable in a function's stack frame.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
An essential component of many buffer overflow attacks is the transfer of execution to code,known as _______,supplied by the attacker and often saved in the buffer being overflowed.

A)NOP code
B)stack code
C)heap code
D)shellcode
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
A _________ can occur as a result of a programming error when a process attempts to store data beyond the limits of a fixed-sized buffer and consequently overwrites adjacent memory locations.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
In 1996 ________ published "Smashing the Stack for Fun and Profit" in Phrack magazine,giving a step-by-step introduction to exploiting stack-based buffer overflow vulnerabilities.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
________ attacks can occur in a binary buffer copy when the programmer has included code to check the number of bytes being transferred,but due to a coding error,allows just one more byte to be copied than there is space available.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The attacker can specify the return address used to enter code as a location somewhere in the run of NOPs,which is called a NOP ______.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
_______ can be placed between stack frames or between different allocations on the heap to provide further protection against stack and heap overflow attacks,but at cost in execution time supporting the large number of page mappings necessary.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.