Question: Q5) consider the following code: int bar.){ char buff[8]; gets(buff); return 0; If the stack of bar before gets is called is: Some data (0x12345678)
![Q5) consider the following code: int bar.){ char buff[8]; gets(buff); return](https://dsd5zvtm8ll6.cloudfront.net/si.experts.images/questions/2024/09/66eedffede44b_94266eedffe70a5b.jpg)
Q5) consider the following code: int bar.){ char buff[8]; gets(buff); return 0; If the stack of bar before gets is called is: Some data (0x12345678) Return Address (Ox084055e0) Saved EBP (Oxbffffd45) buff a) Is the program vulnerable? (i.e., can the attacker exploit the buffer overflow and alter the saved return address?) Explain your answer. (4 marks)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
