lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <BAY106-F17B908D319053783699FE9C0CC0@phx.gbl> Date: Wed Jul 27 19:15:40 2005 From: dan_20407 at msn.com (DAN MORRILL) Subject: Our Industry Is Seriously Ethics Impaired Interesting concept, Brings in mind though the last conversation on this list about Oracle taking two years to develop a patch (even if it was one character in one line of code). So is 3com willing to lean on Oracle or Microsoft, or Real, or anyone else to get the patch done in a reasonable time frame? So that the finder of the issue does not get bored or angry or worried that someone else will discover it and then claim full credit for it? There are some issues here I don't know if 3com has reviewed them all. But they are really putting themselves in a policing action, where I don't think that this community or the IT industry would be willing to accept. I could see CERT doing this, but not 3com. Thanks! r/Dan Sometimes MSN E-mail will indicate that the mesasge failed to be delivered. Please resend when you get those, it does not mean that the mail box is bad, merely that MSN mail is over worked at the time. >From: "J.A. Terranson" <measl@....org> >To: Full-Disclosure <full-disclosure@...ts.grok.org.uk> >Subject: [Full-disclosure] Our Industry Is Seriously Ethics Impaired >Date: Tue, 26 Jul 2005 21:56:45 -0500 (CDT) > > >Yet another voice baying at the moon. > >-- >Yours, > >J.A. Terranson >sysadmin@....org >0xBD4A95BF > > >"A stock broker is someone who handles your money until its all gone." >Diana Hubbard (of Scientology fame) > >----------------------------------------------------------------------- > >http://informationweek.com/story/showArticle.jhtml?articleID=166402192 > >3Com Rewards 'Responsible' Disclosure Of Security Flaws July 25, 2005 >EMAIL THIS ARTICLE >PRINT THIS ARTICLE >DISCUSS THIS ARTICLE WRITE TO AN EDITOR > > > >The company is planning to reward security researchers who reveal >information on newly discovered vulnerabilities. >By John Walko >EE Times > > > >LONDON . Data networking group 3Com is planning to reward security >researchers who reveal information on newly discovered vulnerabilities as >part of an initiative run by its TippingPoint division. > >The so called .Zero Day Initiative. is aimed at ensuring the 'responsible' >disclosure of security flaws in order to make technology more secure for >all users. The goal is to proactively protect businesses against newly >discovered vulnerabilities. > >According to 3Com, many security researchers want to be recognized for >their discovery, but they don't always achieve that in a responsible >manner. Instead, and all too often, they post the potentially harmful >information publicly, catching businesses and vendors off-guard and >unprotected. > >The initiative will recognize researchers for the discovery when the >vulnerability is publicly disclosed with the vendor's patch. > >3Com will notify affected vendors of security flaws so they can >immediately begin working on a solution, most often in the form of a >patch. The vulnerabilities will only be disclosed publicly once the >affected vendor is able to offer a solution to end users, mitigating the >threat. > >Providing pre-emptive protection will be done through 3Com subsidiary >TippingPoint.s Digital Vaccine service. > >The company stressed it would share vulnerability details freely with >other security vendors prior to public disclosure. > >3Com CTO Marc Willebeek-LeMair said the initiative would ultimately >benefit everyone in the industry: security and technology vendors, >security researchers and end users. > >Vulnerabilities enable attackers to gain control of a system for malicious >purposes. They can also result in worms or Denial of Service attacks, >which can bring down entire networks. > >Zero day disclosure occurs when the discoverer of the vulnerability >discloses the flaw to the public without notifying the vendor, putting >businesses at risk from the time of disclosure until the affected vendor >issues a patch. It can take vendors weeks or months to supply a patch. > >David Endler, Director of Security Research for 3Com's TippingPoint >division, said: "This program will extend our research organization even >further, and enable us to tap some of the most brilliant minds in the >global security research community.. > >_______________________________________________ >Full-Disclosure - We believe in it. >Charter: http://lists.grok.org.uk/full-disclosure-charter.html >Hosted and sponsored by Secunia - http://secunia.com/ _________________________________________________________________ Express yourself instantly with MSN Messenger! Download today - it's FREE! http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/
Powered by blists - more mailing lists