ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 104 - SY0-701 discussion

Report
Export

Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?

A.
VM escape
Answers
A.
VM escape
B.
SQL injection
Answers
B.
SQL injection
C.
Buffer overflow
Answers
C.
Buffer overflow
D.
Race condition
Answers
D.
Race condition
Suggested answer: C

Explanation:

A buffer overflow is a vulnerability that occurs when an application writes more data to a memory buffer than it can hold, causing the excess data to overwrite adjacent memory locations. A register is a small storage area in the CPU that holds temporary data or instructions. An attacker can exploit a buffer overflow to overwrite a register with a malicious address that points to a shellcode, which is a piece of code that gives the attacker control over the system. By doing so, the attacker can bypass the normal execution flow of the application and execute arbitrary commands.

asked 02/10/2024
Lucile Jeanneret
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first