If an attacker can cause a buffer to overflow, then the attacker can control other values in the program.
如果攻击者能够导致缓冲区溢出,那么它就能控制程序中的其他值。
2
Any program that allows an external entity to input data is vulnerable to malicious activity, such as buffer overflows and embedded control characters.
任何允许外部实体来输入数据的程序都容易受到恶意的攻击,例如缓冲区溢出和嵌入式控制字符。
3
Then the main chapter comes, which describes the frame of program play software, including play model, channel list receiving model, menu system model and the adaptive buffercontrol algorithm.