A vulnerability where a program writes data beyond allocated memory boundaries, potentially enabling code injection, crashes, or unauthorized system access.

An overflow is a critical cybersecurity vulnerability that occurs when a program attempts to write data beyond the boundaries of its allocated memory or buffer space. This flaw typically arises from programming errors such as insufficient input validation, lack of bounds checking, or poor memory management, allowing excessive data to overwrite adjacent memory regions. Overflows can manifest in several forms, including buffer overflows, integer overflows, and other types of memory corruption across different memory segments.

The consequences of an overflow range from application crashes and denial-of-service conditions to severe security exploits. Attackers can craft malicious inputs to exploit these vulnerabilities, enabling them to inject executable code, alter program execution flow, or achieve unauthorized privilege escalation on compromised systems. Mitigating overflows requires adherence to secure coding standards, diligent input validation, use of memory-safe programming languages or tools, and comprehensive vulnerability assessments throughout the software development lifecycle.