What kind of attack is this program susceptible to?
Identify the line in the source code that might lead to buffer overflow?