While opening an email attachment, Pete, a customer, receives an error that the application has encountered an unexpected issue and must be shut down. This could be an example of which of the following attacks?

A.
Cross-site scripting
B.
Buffer overflow
C.
Header manipulation
D.
Directory traversal