A buffer is allocated on the stack to store function parameters. If a
parameter exceeds the buffer size, the data overwrites the other
stack contents, including the function return call, resulting in an
application failure. Many functions commonly used in C, such as
scanf or strcpy,
don't ensure that the buffer meets the size of the
data copied, and if the application developer
doesn't perform this check herself, the application
will most likely fail the first time the data copied exceeds the size
of the buffer.
An example of this type of problem is an application that opens and
copies the contents of a file using one of the C functions that
don't do buffer size checking. As long as the file
contents are small enough, the application doesn't
generate an error. However, if a file's contents are
too large, the application will fail, abruptly, leaving application
support personnel scratching their heads wondering why an application
that worked to a certain point stopped working.
An application failure is not the worst that can happen in this
situation. Crackers with a good understanding of how the stack works
and knowledge of assembly code can exploit this vulnerability by
writing code to the stack beyond the function arguments and function
return address. In addition, they can rewrite the function return
address to point to the address of the beginning of this malicious
code. When the function finishes, the address of the new hacked code
is pushed to the processor rather than the return location of the
function, and the hacked code is executed, usually with disastrous
results.