208k views
2 votes
Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?

a) Memory leak
b) SQL injection
c) Resource exhaustion
d) Buffer overflow

1 Answer

3 votes

Answer:

d) buffer overflow

Step-by-step explanation:

When buffer overflow happens, data gets overwritten by caller data that is not supposed to be overwritten.

If the caller data is carefully crafter instruction code, this would be a way to execute malicious code.

User Alasia
by
6.9k points