How can an attacker exploit a stack overflow to execute arbitrary code?
A. Modify a function’s return address.
B. Move the stack pointer
C. Substitute elements in the stack.
D. Alter the address of the stack.
A. Modify a function’s return address.
B. Move the stack pointer
C. Substitute elements in the stack.
D. Alter the address of the stack.