Multiple Questions
Multiple Questions
Multiple Questions
Student Name
Institution
Course Name
Instructor
Date
2
Multiple Questions
Cyber security
Question 1
is a critical heap-based buffer overflow flaw allowing attackers to arbitrarily execute code on
unpatched systems. The presence of this vulnerability is due to the incorrect handling of specially
crafted HTTP request packets by the HTTP server, which manipulates the protocol version
string. What's more, if the initial bytes of that string happened to be outside of the range from
0x21 to 0x7e, an integer underflow in the server occurs in its buffer length calculations. That
underflow incorrectly updates internal pointers so that a buffer overflow will take place on any
the server in which non-printable ASCII characters prepend the HTTP protocol version string.
This would trigger the server to misinterpret the amount of data it was to process and would
result in the server writing received data outside of the allocated buffer space. The resultant
overflow may corrupt adjacent memory and may potentially allow the execution of malicious
code.
compromise the unpatched organization's embedded HTTP server and gain code execution with
privileges equal to those of the application running the server. The attack in this context could
lead to unauthorized data access, disruption of systems, or even a successful hijacking of the
server, with the possibility of further deployment across the network. Ensuring that systems are
3
updated and patched is instrumental in defending against high-severity vulnerabilities like such,
rated a maximum CVSS v3 of 10.0 for the impact and ease of its exploitation.
Question 2
Running an Nmap scan on networked assets has a number of major benefits for
enhancing the cybersecurity points of an organization. With Nmap, the active devices on the
network, whether they are servers, routers, or even printers, will be found by cybersecurity
teams. This complete visibility is therefore key to creating adequate network management,
ensuring that all are owned, understood, and authorized. Moreover, Nmap shows the services
and applications each device runs and the open ports, which help find vulnerabilities. That would
allow the security teams to research the overall security posture of network assets and prioritize
Regular scans are important because they allow for continuous monitoring of network
security posture. Because network environments are dynamic and subject to many changes, such
as adding or removing devices, updating services, and more, regular scanning ensures that new
vulnerabilities introduced by the changes are timely detected and addressed. Moreover, regular
scanning contributes to the observance of security policies and standards by ensuring that only
authorized services are running and exposed to the network. Regular Nmap scanning is therefore
a part of proactive security, improving protection with accurate and updated visibility into