- 论坛徽章:
- 0
|
#include <stdio.h>
#include <string.h>
int main(int argc, char *argv[]) {
int i = 1;
char buf[4];
strcpy(buf, "AAAA");
printf("%d\n", i);
return 0;
}
a) When compiled and executed on x86, why does this program usually not
output what the programmer intended?
strcpy拷贝结束符('\0')时 因为buf大小为4字节,覆盖了i的最低字节(之前是1) 变为0;
所以输出结果是0
b) Name several ways in which the security problem that causes this
program not to output what the programmer intended can be prevented
WITHOUT changing the code.
但是这道题就不会了, 翻译是不是这样
找出几种可以解决引起上面程序没有按程序员意向输出的安全隐患的预防方法,且不用改变源码(就是上面那程序)
e文差不知道翻译对不对,
求方法(因为我除了该代码(比如说把buf改为buf[5]),就没有别的办法了) |
|