616 views
0 votes
0 votes
User x has found that s source code has a buffer overflow vulnerability caused by strcpy instruction. He then used strncpy in place of strcpy to prevent buffer overflow vulnerabilities

Which of the following is  true

a.  Buffer overflow attack will not occur in this source code

b.  Buffer overflow vulnerabilities caused due  to strcpy is avoided to some extend since it do the bound check

c. This will not make any change in the source code

d. None of these

2 Answers

0 votes
0 votes
b.  Buffer overflow vulnerabilities caused due  to strcpy is avoided to some extend since it do the bound check

Related questions

1 votes
1 votes
1 answer
1
0 votes
0 votes
1 answer
2
Suman Acharya asked Sep 14, 2017
623 views
In a mandatory access control, information from top secret object will not flow to secret and vice versaTrueFalse
0 votes
0 votes
1 answer
3
Suman Acharya asked Sep 14, 2017
276 views
Match the following a. Secrecy. 1. Limit the resource usage. b Integrity 2. Unauthorized modification c availbility. 3. Unau...
0 votes
0 votes
1 answer
4
Suman Acharya asked Sep 14, 2017
645 views
ASLR randomizesa. The size of all arrays, thereby by making it difficult to perform buffer overflowsb. All instructions in the programc. Positions of the stack, heap and...