Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In addition to stack-based buffer overflow attacks (i.e., smashing the stack), heap overflows can also be exploited. Consider the following C code, which illustrates

  

In addition to stack-based buffer overflow attacks (i.e., smashing the stack), heap overflows can also be exploited. Consider the following C code, which illustrates a heap overflow. int main() { int diff, size = 8; char *buf1, *buf2; buf1 (char *)malloc(size); } buf2 (char *)malloc(size); diff=buf2 - buf1; memset (buf2, '2', size); printf("BEFORE: buf2 = %s", buf2); memset (buf1, '1', diff + 3); printf("AFTER: buf2 = %s", buf2); return 0; (1) Compile and execute this program. What is printed? (2) Explain the results. (3) Explain how a heap overflow might be exploited by Trudy.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Principles Of Information Security

Authors: Michael E. Whitman, Herbert J. Mattord

7th Edition

035750643X, 978-0357506431

More Books

Students also viewed these Programming questions

Question

Are you at your best around 8 or 9 AM? Yes No

Answered: 1 week ago

Question

What do you think?

Answered: 1 week ago