Question: Q5) consider the following code: int bar(){ char buff[8]; gets(buff); return 0; If the stack of bar before gets is called is: Some data (Ox12345678)
![Q5) consider the following code: int bar(){ char buff[8]; gets(buff); return](https://dsd5zvtm8ll6.cloudfront.net/si.experts.images/questions/2024/09/66f032bc3091d_65966f032bb86853.jpg)
Q5) consider the following code: int bar(){ char buff[8]; gets(buff); return 0; If the stack of bar before gets is called is: Some data (Ox12345678) Return Address (Ox084055e0) Saved EBP (Oxbffffd45) buff a) is the program vulnerable? (i.e., can the attacker exploit the buffer overflow and alter the saved return address?) Explain your answer. (4 marks) b) If the gets string is AAAABBBB\x76\xfe\xdcxbe\x45\x40\x55\xOa". Given in the values on the stack after the gets string is copied to buff by gets, What is the new saved EBP and new return address after the attack string is copied
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
