lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9DF3AFD9-BCF6-4746-84B3-E5E1313FCFA2@sunsetfilms.com>
Date: Wed Oct  5 16:25:32 2005
From: dankney at sunsetfilms.com (Donald J. Ankney)
Subject: Publicly Disclosing A Vulnerability

A big part of the equation is your contract with your client. Did you  
sign an NDA? If you did, then the decision really isn't yours anymore  
-- it's your clients (as they now own the results of your work,  
having paid you to conduct it).

NDAs can really suck sometimes -- never sign one lightly.

On Oct 5, 2005, at 7:52 AM, Josh Perrymon wrote:

> Ok,
>
>
>
> I believe in working with the Vendor to inform then of vulnerable  
> software upon finding it in the wild so on?
>
> But I have a question?
>
>
>
> While performing a pen-test for a large company I found a directory  
> transversal vulnerability in a search program?
>
> I used Achilles and inserted the DT attack in a hidden field and  
> posted it to the web server. This returned the win.ini..
>
> Cool..
>
>
>
> Well? I called the company up and got the lead engineer on the  
> phone.. He seemed a little pissed.
>
> He told me that they found the hole internally a couple months ago  
> but they don?t want it public and they said I should not tell  
> anyone about it because they don?t want their customers at risk.
>
>
>
> So I ask the list- what is more beneficial to the customer? Not  
> publicly disclosing the risk and hoping that they follow the  
> suggestions of the vendor to upgrade?  Or waiting 30 days and send  
> it out?
>
>
>
>
>
>
>
> Joshua Perrymon
>
> Sr. Security Consultant
>
> Network Armor
>
> A Division of Integrated Computer Solutions
>
> perrymonj( at )networkarmor.com
>
> Cell. 850.345.9186
>
> Office: 850.205.7501 x1104
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20051005/ac5bb286/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ