In addition to stack-based buffer overflow attacks (i.e., smashing the stack), integer overflows can also be exploited. Consider the following C code, which illustrates an integer overflow [36].
a. What is the potential problem with this code? Hint: The last argument to the function memcpy is interpreted as an unsigned integer.
b. Explain how an integer overflow might be exploited by Trudy.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here