Buffer overflow is one of hacking technique to gain root/adminstrator privileges access by exploiting the weak application vulnerabilities installed/running in a system. How can this be done? The hacker make an application/program that will make the buffer memories provided by the system for the target application will overload and then overwrite the other buffer.
This method of hacking can be dangerous because when the application that can be buffer overflowed is an application that runs on the root level, the hacker will also gain a root level access by doing this technique to that application. Even worse, if the hacker know how to do privilege escalation, any application no matter what level of user runs it that can be buffer overflowed will lead the hacker to gain root access.
“the quieter you become, the more you are able to hear..”