Given the above information, which of the following processes was MOST likely exploited via a remote buffer overflow attack?