Which of the following best describes a buffer overflow attack?
A.
The application is sent a large amount of spoofed data, causing the buffer to crash and cease
authenticating connections.
B.
A portion of the application is made to adjust its buffer too low, thus causing the overflow
because system RAM is completely overwritten.
C.
A portion of the application’s data is written to a fixed-length buffer, but the data accepted for
that buffer is too large, causing the overflow.
D.
The application is improperly written so that it does not have any buffers allocated, which then
overwrites the neighboring memory allocation, causing the overflow.
Explanation: