Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Answer the following questions about the vulnerable code below void test Fune(int a, double b) { char buf(10); //line 1 gets (buf): //line 2 int

image text in transcribed
Answer the following questions about the vulnerable code below void test Fune(int a, double b) { char buf(10); //line 1 gets (buf): //line 2 int v1 - 0 //line 3 printf (buf): //line 4 a. What is the name of this vulnerability? 111 b. In which line (1,2,3,or 4) does it have the vulnerability and why? 1+1] c. What are the two goals of an attacker for exploiting the vulnerability? 121 d. Assume that the computer has a 16-bit architecture, i.e. Integer variables and memory addresses are two bytes. Glve example of an attack input that performs the code injection attack. Explain different parts of the input. [3] e. Which compiler enhancement uses canary guard solution? Explain why an attacker who is trying to do code injection attack must not know the canary value? (2+3)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Intranet And Web Databases For Dummies

Authors: Paul Litwin

1st Edition

0764502212, 9780764502217

More Books

Students also viewed these Databases questions

Question

2. Identify four types of migrant groups.

Answered: 1 week ago

Question

Describe Table Structures in RDMSs.

Answered: 1 week ago