[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.60.0709241100180.26442@sploit.scriptkiddie.org>
Date: Mon, 24 Sep 2007 11:11:33 -0700 (PDT)
From: Lamont Granquist <lamont@...iptkiddie.org>
To: bugtraq@...urityfocus.com
Subject: Re: Re: 0day: PDF pwns Windows
I was under the impression that "0day" came from the hacking/cracking
community and was synonymous with the concept of "private 0day" that has
been used in this thread.
So, a hacker/cracker would have a variety of tools at their disposal
including many exploits that were known to security professionals,
vendors, and the public for various lengths of time, but also the "0day"
exploits for which no vulnerable machines should be patched against. As
soon as the vulnerability is published, it no longer becomes a "0day"
since even in the absence of vendor patches, admins could take actions to
audit and protect their systems.
Under this definition, "0day" exploits should be not publically disclosed
and to be pedantic should be actively being used to break into systems.
Exploits generated by the grey-hat community, not used for malicious
reasons, and published before vendor patches exist would not have gone
through the "0day" stage. Neither would exploits generated for publically
known vulnerabilities before the vendor patches were released would be
considered "0day" since the vulnerability was publically known and again
there could be workarounds encountered by the hacker/cracker that would
prevent gaining access.
It seems that the definition of the term has morphed in the past 10+ years
though...
On Sat, 22 Sep 2007 johanfunsale@...oo.com wrote:
> I think we're missing the point. To my very limited knowledge, a zero
> day vulnerability is a vulnerability that is released into the wild
> before the vendor has notified its customers thereof, i.e. the person
> who discovered the vulnerability decides to release it to parties other
> than the vendor in question.
>
> This will most likely lead to a zero day exploit, which is an exploit
> that "exploits" the vulnerability before the vendor releases a patch for
> that vulnerability.
>
> This is just my view, but if it makes sense, use it as your own.
>
> Regards,
> Johan
>
Powered by blists - more mailing lists