Ann is concerned that the application her team is currently developing is vulnerable to unexpected user
input that could lead to issues within the memory is affected in a detrimental manner leading to potential
exploitation. Which of the following describes this application threat?
A.
Replay attack
B.
Zero-day exploit
C.
Distributed denial of service
D.
Buffer overflow
I think the correct answer is D. The keyword is “memory” on the question.
I picked Buffer Overflow as well. “Unexpected user input” is another important factor.
It is D Buffer overflow–more commonly known as heap stack buffer overflow attack.
It is D: the concern is also potential exploitation [confidentiality and integrity] and not loss of availability [DoS].