. . . "An attacker can exploit this vulnerability to overflow the buffer and overwrite the return address. [0008] There are various types of buffer overflow attacks known in the art, including attacks that directly overwrite the return address on the stack; those that overwrite a pointer variable adjacent" .