lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 23 Mar 2011 20:43:35 +0000
From: Jamie Riden <jamie.riden@...il.com>
To: "J. Oquendo" <sil@...iltrated.net>
Cc: Theo de Raadt <deraadt@....openbsd.org>,
	Jim Harrison <jim@...tools.org>,
	Luigi Auriemma <aluigi@...istici.org>,
	Michal Zalewski <lcamtuf@...edump.cx>, bugtraq@...urityfocus.com
Subject: Re: Vulnerabilities in some SCADA server softwares

The correct time for vendors to do their own homework on SCADA was
2003 - that was the wakeup call. Anyone who has programmed for SCADA
has always wondered what would happen if they started poking
undocumented values into undocumented registers, but may not have the
luxury of trying it out.

Having been a security/network admin, there are many things that can
be done when you know of a vulnerability - snort sigs, snort flexible
response (thanks Jeff!), firewall configs, etc. I've done them before
when vulns have been published before patches, and it is much better
knowing that something is up than not. Do not rely on your vendor to
keep you up to date on security issues.

cheers,
 Jamie

On 23 March 2011 18:36, J. Oquendo <sil@...iltrated.net> wrote:
> On 3/23/2011 2:13 PM, Theo de Raadt wrote:
>>> If *any* threat exists,
>>> that threat is increased by public exposure of unmitigated attack
>>> methodology
>> I think you have it wrong.
>>
>> Public exposure increases the visibility, and therefore customers
>> install the patches quicker.
>>
>> Without public visibility, they will keep running the old code.
>
> You're flawed in your response: "Public exposure increases the
> visibility, and therefore customersinstall the patches quicker." ...
> When someone "full discloses" a vulnerability, there is no patch to
> install quicker. This is obvious because there is no patch until either
> the vendor releases one, or staff using the product are capable of
> creating a work-around. In the case of the SCADA environment, we (again)
> are not talking about the potential of a defacement, blue screen, silly
> shell, we're talking about sensor, gears and often so much automation
> that it would be absurd for a SCADA engineer to "go it alone" and try
> create their own patch. Many of these systems don't have the option of
> failing or being taken offline. You also state: "Without public
> visibility, they will keep running the old code" the reality is, no one
> is going to outright replace some of these systems in these
> environments. These are not applications and or systems one can plop
> onto donated boxes. They have no choice BUT to run the code.

-- 
Jamie Riden / jamie@...eynet.org / jamie.riden@...il.com
http://uk.linkedin.com/in/jamieriden

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ