lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 21 Jul 2007 11:22:00 -0400
From: "Ken Kousky" <kkousky@...inc.com>
To: "'Chad Perrin'" <perrin@...theon.com>,
	<bugtraq@...urityfocus.com>
Subject: RE: Internet Explorer 0day exploit

Zero day is a serious misnomer from vendors that suggest that the counting
of time an exposure is known BY THE GOOD GUYS is some kind of trigger date
when in reality, many serious exploits are know BY THE BAD GUYS so the day
zero is really months or maybe years prior to the disclosure or notification
date. Look at the WMF vulnerability that caused a mad rush to patch it once
the good guys were put on notice. In this case, the vulnerability had been
present in Windows products since the early 90s and according to Kapersky
Labs there was even malware being sold that took advantage of it long before
there was even day zero notification.

So, I'd say that day zero is hype and misleading in that it takes us away
from the reality that EVERY PATCH fixes an exposure that existed from the
time the software was deployed and NOT from the day of reporting or
disclosure. Maybe if we tracked day zero as the installation day of the
faulty code we'd all have a better understanding of how untrustworthy our
base of COTS products really are!

KWK

-----Original Message-----
From: Chad Perrin [mailto:perrin@...theon.com] 
Sent: Friday, July 20, 2007 5:09 PM
To: bugtraq@...urityfocus.com
Subject: Re: Internet Explorer 0day exploit

On Wed, Jul 18, 2007 at 10:12:11PM +0200, Chris Stromblad wrote:
> 
> Zow Terry Brugger wrote:
> >> What exactly constitutes a 0day? From my perspective naming a
> >> vulnerability 0day have absolutely no value whatsoever, it just doesn't
> >> make any sense. 0day for who? The person who release it, sure, but for
> >> the security community as a whole... nah.
> > 
> > I consider a "0day" to be a vulnerability for which there is an exploit
in 
> > the wild before there's a vendor patch for the problem. If this
convention is 
> > followed, it has value to the community, because we know that having
that 
> > software on our systems presents a significant risk.
> 
> Fair point, had not considered that before. It would be better to just
> call it active vulnerability vs inactive vulnerability. Active would
> define something that yet cannot be prevented and has "wild" exploit
> code where a passive vulnerability is something that has been patched
> and _should_ no longer be applicable. Anyways, you make a good point.

Shouldn't that distinction be simply marked by the terms "patched" and
"unpatched"?

My understanding of the term "zero day exploit" is that it refers to a
vulnerability for which there is an exploit "in the wild" or known
publicly, concurrent with knowledge of the vulnerability itself.  Thus,
the exploit is out there on "day zero".

The term "zero day vulnerability" just seems to be an error of phrasing,
where "vulnerability" replaces "exploit", and as a result confusion such
as in this discussion arises.  Of course, I'm not "in charge" of
maintaining these terms' meaning, so I imagine my opinion of the matter
won't count for much.


> > 
> >> One more thing about "advisories". I think it would be better to
release
> >> them immediately and let people know what they are facing. With public
> >> dissemination of a vulnerability perhaps someone will release a 3rd
> >> party patch or another inventive way of protecting oneself. Holding it
> >> "secret" really doesn't help anyone. If anything it prevents people
from
> >>  trying to find a way to fix the vulnerability.
> > 
> > First off, I don't think anyone can seriously say it doesn't help
_anybody_ 
> > -- it certainly helps the vendor. If it's an IDS/IPS company that holds
the 
> > research and they've got a signature out for it on their system, it
certainly 
> > helps them. Here we find a variation on the ancient (in Internet terms) 
> > argument about full disclosure: if bugs are public knowledge, will
vendors be 
> > more responsive to fixing them? I don't think you're going to see
publicly 
> > developed patches for any but the most extreme cases. At the same time,
I see 
> > some advisories where the vendor was notified more than six months ago
and 
> > just has a patch out now. That's a pretty large window of vulnerability
if 
> > anyone malicious knows about the problem (and if we're finding them in
the 
> > open community, there's no reason they wouldn't). I think security 
> > researchers need to continue to think about exuding due pressure on
vendors 
> > to get bugs patched.
> 
> Yes it sure helps the vendor, but it certainly doesn't help the end
> user/customer and in my opinion it is he who matters. The vendor has a
> responsibility towards the consumer, not the other way around. By not
> exerting any pressure on vendors, I believe things will never change. It
> certainly doesn't make any sense for a vendor to become proactive in
> making their software more secure. At least not until enough people
> start demanding more secure software...

It looks like the two of you are in violent agreement.

-- 
CCD CopyWrite Chad Perrin [ http://ccd.apotheon.org ]
John Kenneth Galbraith: "If all else fails, immortality can always be
assured through spectacular error."

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ