I\'m Not certain what course of action should be taken and what type of recommen
ID: 3808245 • Letter: I
Question
I'm Not certain what course of action should be taken and what type of recommendations. Since nobody knows how that program got there to begin with and the company appears to not be using it, couldn't the program just be uninstalled and done away with all together?
Hands – On Ethical Hacking and Network Defense 3rd edition Case Project 8-2: Detecting Unauthorized Applications
In conducting a review of the Oss running on the Alexander Rocco network, you detect a program that appears to be unauthorized. No one in the department knows how this program got on the Linux computer. The department manager thinks the program was installed before his start date three years ago. When you review the program’s source code, you discover that it contains a buffer overflow vulnerability. Based on this information, write a report to the IT manager stating what course of action should be taken and listing recommendations for management.
Explanation / Answer
Body of Report
I have found buffer overflow vulnerability in the code. This might results in the overwritig of some of the datas or might result in other actions. What happens with the overflowed data is highly unpredictable and thus, might cause some serious problems to the system. This error occurs when you are loading more data into buffers than its capacity, and the extra data gets written somewhere in the memory and these extra datas might get executed.
I would recommend to uninstall the program since we are not using it and it might cause some serious damages to the system. There is a 2nd option too. Since, I have gone through the code and have detected the errors, so, I can fix the bug in some time. But 2nd option is a bit riskier as there might be some bugs in the code which could have gone unnoticed.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.