Buffer overflow, in the presence of a buffer overflow security vulnerabilities i
n the computer, the attacker can exceed the normal length of the number of chara cters to fill a domain, usually the memory address. In some cases, these excess characters can be run as executable code. So that an attacker cannot be bound by s ecurity measures to control the attacked computer. It is one of the most common means of attack, the worm on the operating system in high-risk vulnerabilities o verflow speed and large-scale propagation are using this technology. Buffer over flow attacks in theory can be used to attack any defective imperfect procedures, including anti-virus software, firewalls and other security products, as well a s attacks on the banks of the attack program.