unchecked buffer

unchecked buffer

The lack of validity checking of the data that is written into a program buffer. Buffers are reserved areas in the program (in memory) that accept data from external sources. Unchecked buffers can cause all kinds of errors and erratic behavior.
References in periodicals archive ?
It's another unchecked buffer that, if overrun, allows malicious code to be executed.
D-Link, a leading designer, developer and manufacturer of award winning firewalls and routers, today announced that D-Link firewalls already protect users from people trying to break in through the recently announced critical security breaches in Windows described by Microsoft as an unchecked buffer or buffer overrun vulnerability and a denial of services vulnerability.
The malware is using the Server Service flaw that was patched last Tuesday in Microsoft bulletin MS06-040, which fixes a flaw in an unchecked buffer in the Server Service and allows for anonymous exploitation remotely.
Another ActiveX vulnerability, this one an unchecked buffer in a component of Windows Help, only affects Windows 2000 machines.
Exploitable via an unchecked buffer in Windows Media Player that allows a malicious bitmap file (BMP) to be used to execute commands on a remote system, in the context of a logged-in user.
In the case of Code Red, it was an unchecked buffer in the IIS Index Server that allowed the worm to spread.
The vulnerability exists due to an unchecked buffer in Windows Media Player that allows a malicious bitmap file (BMP) to be used to execute commands on a remote system, in the context of a logged-in user.
In this specific case, the IIS 5 ISAPI extension that implements the Internet Printing Protocol (IPP) in Windows 2000 is subject to an unchecked buffer.
This vulnerability is caused by an unchecked buffer in the SMTP service.
The MS04-007 patch corrects an unchecked buffer in Microsoft's Abstract Syntax Notation One (ASN.
The MS03-027 cumulative patch fixes an unchecked buffer only found in the Windows XP shell that could enable system compromise, allowing an attacker to exploit this vulnerability by hosting a Desktop.
Scope: An unchecked buffer in a component of Sun's Solaris Operating System can be overrun and remotely exploited, allowing an attacker to execute arbitrary code with root privileges.