A CGI application on the company’s Web server has a bug written into it. This particular bug allows the application to write data into an area of memory that has not been properly allocated to the application. An attacker has created an application that takes advantage of this bug to obtain credit card information. Which of the following security threats is the attacker exploiting, and what can be done to solve the problem?
A.
– Buffer overflow
– Work with the Web developer to solve the problem
B.
– SQL injection
– Work with a database administrator to solve the problem
C.
– Denial of service
– Contact the organization that wrote the code for the Web server
D.
– Man-in-the-middle attack
– Contact the company auditor