Buffer
Overflow Defenses. ©2002, Jedidiah R. Crandall, Susan L. Gerhart, Jan G. Hogle.
http://sfsecurity.pr.erau.edu.
Find-and-patch Methods
Software patches
Pros:
Very effective at preventing known buffer overflow
attacks for specific vulnerabilities
Cons:
No protection against unknown attacks or known attacks
for which a patch has not been released
Not all patches fix the buffer overflow, some are
specific to one attack but leave the buffer
overflow itself in place
The customer must regularly check for patches for their
system (at the vendors website or www.cert.org) and install them.