adplus-dvertising
frame-decoration

Question

Which type of vulnerability is required for an attacker to exploit the buffer overflow bug?

a.

Underflow vulnerability

b.

Overflow vulnerability

c.

Input validation vulnerability

d.

None of the above

Posted under Reverse Engineering

Answer: (b).Overflow vulnerability Explanation:In order to exploit the vulnerability, attackers must locate a function that passes values back to the caller using parameters and that has an overflow bug.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which type of vulnerability is required for an attacker to exploit the buffer overflow bug?