Question: In addition to stack - based buffer overlow attacks ( i . e . , smashing the stack ) , heap overlows can sometimes be

In addition to stack-based buffer overlow attacks (i.e., smashing the stack), heap overlows can sometimes be exploited. Consider the following C source code, which illustrates a heap overlow.
a) Compile and execute this program. What is printed?
b) Explain the results you obtained in part a).
c) Explain how a heap overlow might be exploited by Trudy.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!