In the simplest case, consider a Boolean flag allocated in memory directly after a buffer.
最简单的情况就是考虑直接在缓冲区后面的记忆体中指派一个布尔标志。
2
If a malicious user can overwrite the buffer, then the value of the flag can be changed, thus providing the attacker with illegal access to private files.