1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa [96]
3 years ago
14

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at

tacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions
Computers and Technology
1 answer:
Anni [7]3 years ago
6 0

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

You might be interested in
You just realized the turn signal on your vehicle is broken,
zimovet [89]

Answer:

c

Explanation:

7 0
4 years ago
Array elements must be ________ before a binary search can be performed.
Sladkaya [172]
In order.
You have to be able to see if its on the left or right side of the midpoint
7 0
3 years ago
Finding your style in photography is about ___
marusya05 [52]
Only B and C would be the best choice
7 0
3 years ago
Read 2 more answers
How long will it take Lola to travel from Paris to nice?
Alisiya [41]

the answer is 5,000 hours.

I recommend you post these kind of questions in the mathematics section

4 0
4 years ago
Types publication formats
hjlf

Answer: you weren't very specific but one type of format is APA, many professors enjoy the use of APA

Explanation:

if my answer was incorrect, please specify what you are asking.

4 0
4 years ago
Other questions:
  • In what way would web-based applications be useful to organizations?
    8·1 answer
  • What could break the circuit between your home and an electric power plant?
    15·2 answers
  • You can use the windows ________ to check on a nonresponsive program
    12·1 answer
  • What is used to connect computers to the internet*Audio Ports
    15·2 answers
  • What are the draw backs of the third generation computer​
    13·1 answer
  • Question 13(Multiple Choice Worth 5 points)
    6·1 answer
  • I need help converting this to python but i have no idea how to.
    12·1 answer
  • A major retailer wants to enhance their customer experience and reduce losses
    6·1 answer
  • Make and run a Python program which:
    13·1 answer
  • Which statement best describes how the programming layer of abstraction in
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!