What is the potential risk of having a program vunerable to buffer overflow in a serverless context?

If I have written a program in C that is vunerable to buffer overflow and then run it in AWS lambda. What kind of data could an attacker get access to or what kind of strange behavior might be possible. Im thinking that the aws lambda runtime basically has support for people uploading code that is super malicious in the first place so uploading a well behaved C code with vulnerability must be a subset of that scenario. Summary: is it potentially dangerous to have buffer overflow vulnerability in custom C code uploaded and run in AWS lambda. Also the source is closed source.

Touch here for the full post on Network Security Noblemen tumblr

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s