Full Disclosure mailing list archives
it's all about timing
From: full-disclosure () lists netsys com (Moyer, Shawn)
Date: Wed, 31 Jul 2002 17:53:08 -0500
Comments inline. cc: to that "other" list deleted.
Sure, HP's response has been harsh. But every security problem (especially when it's accompanied by an exploit) should be reported first to the vendor! There should be no exception from this rule. The person doing the reporting should give the vendor a reasonable period of time to fix it; say, a few weeks or so. Only if the vendor does nothing in these weeks, only then the report/exploit/whatever should be made public.
Riiight.... Great. But according to the (now-yanked) CNet article, Snosoft started talked to HP *this spring*, and HP sat on their hands. So, if the vendor gets several months notice, does exactly jack squat, and then the vuln. leaks somehow, who do you blame? As Paul S. pointed out, nothing is black and white, it's all just shades of grey. Me, I blame the vendor. For fsck's sake, this thing works with a no-exec stack! How sad is that? And these dorks wanted months and months to fix it? Who do they think they are, ISC? [ ^_^ ] Sure, it shouldn't have leaked, but exactly how long *were* they going to let every OSF/1 box out there be a sitting duck? At least now I know to chmod 750 /bin/su and chown it root:wheel (a good practice anyway). --shawn
Current thread:
- it's all about timing Florin Andrei (Jul 31)
- it's all about timing John Scimone (Jul 31)
- <Possible follow-ups>
- it's all about timing Schmehl, Paul L (Jul 31)
- it's all about timing Dave Killion (Jul 31)
- it's all about timing Moyer, Shawn (Jul 31)
