When developing an application, a programmer must carefully manage the resources to prevent security vulnerabilities. Which of the following scenarios represents the BEST example of an integer overflow that could result in security implications?
A database uses a long integer type to auto-increment primary keys to prevent running out of unique identifiers.
A cryptographic algorithm uses large prime numbers for generating keys, ensuring secure communication between parties.
A function that improperly validates user input allows a very large value to be submitted, causing the program to wrap the integer count and overwrite adjacent memory.
A user is denied file upload capabilities after reaching the upload limit, preventing any further data from being added to the server.
A payment application prompts the user when the inputted credit card number exceeds the standard length and awaits correct input.
An image editing tool allocates fixed memory for image processing, regardless of the image size supplied by the user.