Answer and Explanation:
(a) Vulnerabilities presented by the flaw are:
(b) The flaw can be constrained by dividing the stack and allotting the stack to each procedure. The access confinements can be applied to the procedures with the goal that they can't get to different procedure stack substance.