Problem
1. Define buffer overflow.
2. List the three distinct types of locations in a process address space that buffer overflow attacks typically target.
3. What are the possible consequences of a buffer overflow occurring?
4. What are the two key elements that must be identified in order to implement a buffer overflow?