How security flaws work: the buffer overflow Wednesday, August 26, 2015 Teklinks The buffer overflow has long been a feature of the computer security landscape. In fact the first self-propagating Internet worm—1988's Morris Worm—used a buffer overflow in the Unix finger daemon to spread from machine to machine. Full article Email This BlogThis! Share to X Share to Facebook