S
S
Sergey Bocharov2021-06-15 16:33:18
Information Security
Sergey Bocharov, 2021-06-15 16:33:18

Buffer overflow in terms of IP security, external or internal vulnerability?

To clarify, a buffer overflow in the IS of a company that is undergoing an ISO 27001 audit. Now this vulnerability is internal or external for her.
For example, from the point of view of 27001, if the server room is not protected, and the server can be stolen, then this is an external vulnerability,
but the server disk overflow vulnerability is internal.

Answer the question

In order to leave comments, you need to log in

3 answer(s)
R
Ronald McDonald, 2021-06-15
@Zoominger

If the overflow occurs in the local program, then the internal one.
If it is called on a web server and is called by a specially designed request, then it is external.

V
Vladimir Dubrovin, 2021-06-15
@z3apa3a

Buffer overflows are a class of programming errors that can lead to vulnerabilities. Whether it leads to a vulnerability and to which one depends on where exactly this buffer overflow occurs and by whom, how and through which vector it can be exploited.

S
Sergey Bocharov, 2021-06-16
@azat

According to the ISO 27001 standard, it is actually an internal vulnerability.
Specifically, assets have internal (or intrinsic) and external (or extrinsic) vulnerabilities. For example, with respect to information and communication technology (ICT), intrinsic vulnerabilities can be found within system design, security configurations, hardware, and software, among other areas (ENISA, 2017).
https://www.unodc.org/e4j/en/cybercrime/module-9/k...

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question