Also key to ISS' preemptive server protection strategy is the company's BOEP technology, which protects hosts from attackers and worms that attempt to use known or previously unknown buffer overflow
attacks to exploit the system or propagate.
As an example, beSTORM automatically tries every protocol combination possible until a buffer overflow
The Symantec buffer overflow
vulnerabilities could allow an attacker to execute code, resulting in the compromise of vulnerable clients and servers running the affected software.
The Citrix(R) NetScaler(R) Application Firewall protects Web applications from the growing number of application-layer attacks, including buffer overflow
exploits, SQL injection attempts and cross-site scripting attacks, and provides-identity theft protection by securing confidential corporate information and sensitive customer data.
html) describes a Microsoft Windows MetaFile (WMF) handling buffer overflow
vulnerability that exploits a feature of Windows used to process image files.