In this target, the buffer overflow is restricted and cannot directly overwrite the return address. You:
a) Have full control over the system
b) Need additional tools to exploit the vulnerability
c) Cannot execute arbitrary code
d) Can bypass security measures