Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: Bad news on RPC DCOM2 vulnerability
From: Valdis.Kletnieks () vt edu
Date: Sat, 11 Oct 2003 11:20:23 -0400

On Sat, 11 Oct 2003 01:28:40 PDT, Peter King <elvi52001 () yahoo com>  said:

why those *security* sites keep *exploits* online even when they know that
this is an unpatched vuln !!!!

(Disclaimer:  I'm explaining the site's logic as I see it.  I may be wrong -
they may just be totally irresponsible and not care at all.  In any case,
not saying I necessarily agree with it, although I'll admit that it takes a
very large cluestick to get some vendors moving....)

Because the vulnerability is in software from a commercial vendor.  This
actually matters.

An open-source package will often get a patch quickly, because the
of the open-source community is to a large degree pride and recognition.
get patched quickly because it's embarrassing to have a large hole go

A commercial closed-source vendor isn't there for recognition.  It's there
make money*.  Fixing holes *costs* money - as a result, there is a
*dis*incentive to actually fix bugs, unless the number/severity of the bugs
*so* bad that it starts affecting sales of the product.

You'll notice that Bill Gates made the "First Great Commitment To Security"
speech only after Microsoft software had gotten burnt by Code Red, Nimda,
and a
large number of Outlook-based malware.

You'll notice that Ballmer made the "Second Great Commitment To Security"
speech last week only after Microsoft software had gotten whacked by Blaster
and Nachi.

You'll notice that even all that malware put together hasn't been enough to
make them admit the basic code base is screwed and needs to be thrown out
redone from scratch - because THAT would make a multi-billion dollar hit in
their bottom line.

How fast would Microsoft move, given their choice, if they *didnt* know that
there was an exploit available, and that it was just a matter of time before
the exploit got bolted onto one of the numerous worm sleds already

And *that* my friends, is why they make exploits available.

Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

  By Date           By Thread  

Current thread:
  • Re: Bad news on RPC DCOM2 vulnerability Valdis . Kletnieks (Nov 07)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]