A CGI application on the company’s Web server has a bug written into it. This particular bug
allows the application to write data into an area of memory that has not been properly allocated to
the application. An attacker has created an application that takes advantage of this bug to obtain
credit card information. Which of the following security threats is the attacker exploiting, and what
can be done to solve the problem?
A.
– Buffer overflow
– Work with the Web developer to solve the problem
B.
– SQL injection
– Work with a database administrator to solve the problem
C.
– Denial of service
– Contact the organization that wrote the code for the Web server
D.
– Man-in-the-middle attack
– Contact the company auditor