lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <469E7549.5040005@outpost24.com>
Date: Wed, 18 Jul 2007 22:17:13 +0200
From: Chris Stromblad <cs@...post24.com>
To: Bigby Findrake <bigby@...emeron.org>, bugtraq@...urityfocus.com
Subject: Re: Internet Explorer 0day exploit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello,

Bigby Findrake wrote:
> On Wed, 18 Jul 2007, Chris Stromblad wrote:
> 
> <deletia>
> 
>> One more thing about "advisories". I think it would be better to release
>> them immediately and let people know what they are facing. With public
>> dissemination of a vulnerability perhaps someone will release a 3rd
>> party patch or another inventive way of protecting oneself. Holding it
>> "secret" really doesn't help anyone.
> 
> With regards to your last statement, I would like to believe that that's
> so, or at least that if there is some harm in "early release" of
> information that that harm is mitigated (if not outright outweighed) by
> the potential good that's done by alerting the community and thereby
> allowing them to develop their own responses.

Exactly. Why is it that many people seem to agree that it's less likely
that something bad will happen if information is not disclosed. I'd say
it's an equal, if not bigger, chance that something good happens. It's
all about proportions really. There is likely more "good" people out
there than "bad". If x % of the good guys look at it, they will likely
count for a higher number of people as compared to an equal % x of the
bad. So, yes... I believe that immediate information disclosure about a
bug is better. It shortens the exposure window and it certainly does put
more pressure on the vendor to come up with a patch.

> 
> I guess what we're really talking about here is the perceived potential
> negative impact of letting the bad guys know that a vulnerability exists
> in space X (that they might then attempt to exploit where without that
> knowledge, they wouldn't try to exploit it even if it could be argued
> that they would attempt to find it) vs. the perceived potential good of
> allowing the good guys to attempt to formulate their own defenses
> tangential to some sort of "official" response.
> 
> It seems to me that without metrics (how many early release advisories
> turned into exploits that wouldn't have been created without said
> advisory?) that all discussion on this topic is either philosophical or
> academic (which is not to imply "without merit").

Yeah, let's stay away from speculation and assumptions for now.

> 
>> Anyways, enough ranting.
> 
> I, for one, enjoyed your rant.

Well thank you, perhaps I should do it more often.

> 
> 
> 
> -- Making files is easy under the UNIX operating system.  Therefore,
> users
> tend to create numerous files using large amounts of file space.  It
> has been said that the only standard thing about all UNIX systems is
> the message-of-the-day telling users to clean up their files.
>                -- System V.2 administrator's guide
> 
> finger://ephemeron.org/bigby
> http://www.ephemeron.org/~bigby/
> irc://irc.ephemeron.org/#the_pub
> news://news.ephemeron.org/alt.lemurs
> 
> 

/ Chris

- --
Chris Stromblad (CEH)
Security Engineer
Outpost24 UK

90 Long Acre
Covent Garden
London, WC2 E9RZ

- -------------------------
Tel: +44 (0) 207 849 3097
Dir: +44 (0) 208 099 6595
Fax: +44 (0) 207 849 3140
- -------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.5 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGnnVJ+CG0a/ZJxn8RAmTsAKDRcGi+6jyPpWQofxyaWaOjg2w33gCfSWTj
MHqg5Up5AvwBIvcWc0Lbj70=
=K9KH
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ