lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAHkw4Gu_dyFnwb4QeAK4kK-pTMcK2vxmZC5fqqrqHG2Z+X4MVQ@mail.gmail.com>
Date: Sat, 14 Dec 2013 02:52:33 +0000
From: Dieyu <dieyu@...yu.org>
To: Georgi Guninski <guninski@...inski.com>
Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: <b>Where are you guys standing re: the (full)
disclosure question?</b>
Q: 1. should I tell MS first?
A: Microsoft is just a big company - there are good guys(my good friend was
there), and there are bad guys(who think too much about money, etc). So,
it's up to you whether you email secure@ms. Another factor: it can take
months for a bug to be fixed(first MSRC checks it, then product team fixes
it, then release - all steps take a lot of time). Guninski "give them a few
seconds" - if you want to work with Microsoft, you got to be a little
patient.
Q: 2. being this is possibly my first bug as a researcher, will this get me
into trouble (legal or otherwise)?
A: No, publishing before fix will not get you into trouble. Guninski "if
they sue you" - they won't sue you(Guninski did it before on Microsoft
products, and he is fine).
Q: 3. will this make me a rock star?
A: Ah, this depends on the impact.
__________
http://offlinechromeinstaller.com/
On Fri, Dec 13, 2013 at 3:08 PM, Georgi Guninski <guninski@...inski.com>wrote:
> On Thu, Dec 12, 2013 at 10:02:55PM -0400, Pedro Luis Karrasquillo wrote:
> > Humans, Dwarves, Elves, Fairies and all free folk on this list:
> >
> > Meli Kalikimaka.
> >
> > I think I found a relatively small bug with Windows Server running DNS
> with recursion turned off, that still allows the server to be used for DDOS
> amplification attacks. There are a sizable number of these on the net, and
> I do not think operators realize that the server is not totally silent with
> recursion turned off.
> > I want to put my findings here on the list, as well as on my blog but I
> am unsure if :
> >
> > 1. should I tell MS first?
>
> if you ask me definitely no.
> or at most give them a few seconds.
>
> > 2. being this is possibly my first bug as a researcher, will this get me
> into trouble (legal or otherwise)?
>
> if they sue you, I suppose this will make you a star for some time.
>
> IANAL, so take care.
>
> > 3. will this make me a rock star?
> >
> > I have details on the bug, as well as remediation steps. I would not say
> I "discovered" it per se, as I found it while studying an attack on a
> network I protect, but I do not see it documented anywhere either.
> >
> > What say you, Wise List Readers?
> >
>
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists