Full Disclosure mailing list archives
Re: Re: Re: <to various comments>EEYE: Microsoft ASN.1 ...
From: "Gregory A. Gilliss" <ggilliss () netpublishing com>
Date: Thu, 12 Feb 2004 07:59:38 -0800
I do not work for eEye, although I have a favorable impression of the work that I see them produce. My personal prejudice is that I subscribe to the school of "security by embarrassment". Vendors (and examples of this are legion) fix holes in their code much more quickly when the hole is widely publicized, and when the exploit code, regardless of its author, is widely available. This scenario places the requisite pressure on the vendors to force them to commit resources that they would not otherwise commit to discovering and repairing the software flaws that they foist upon the community in the name of time-to-market and greater profitability. I disagree with this perspective. The goal of security research is understanding. If we work for someone and have not the time/permission/ resources/fill-in-the-blank necessary to understand, that is one thing. However to withhold the information for the sake of censorship/proxied responsibility/corporate bondage is another. If a US company cannot release full details of a vulnerability because the lawyers will swoop down from on high, what value does the research accomplish? If "polls show that admins want the details", all the better. If admins don't have the time/permission/etc to delve into the details in order to understand, I assert that that is indicative of a deeper problem with our work and our culture. Being overwhelmed is not the same as being restrained. The Rule of Law exists to proscribe what acts civilization permits and prohibits, and the consequences for transgression. FD exists to allow people to share, educate, and discuss security vulnerabilities and exploits. Reading this post, I suspect that someone is confusing the two. Agreed, we are no longer in the period of time when someone can trespass on your computer with impunity. However I do not believe that the responsibility for enforcing that social edict resides with either this list or the vendors or the security researchers. I'm not asking, but it appears evident that eEye has a business partner agreement with M$ that restricts their ability to release their research in a "timely manner". Same thing that happened to securityfocus when Symantec bought them. The rules have changed. I acknowledge the situation. However I tolerate it; I do not care for it one bit. G On or about 2004.02.12 00:56:59 +0000, Paul Tinsley (pdt () jackhammer org) said: <<SNIP>>
Question: "Why release all of the details"This statement is not an accurate paraphrase, I didn't say why release them all. I said why release them all on day 0 of the patch release.Answer: Polls show this is what administrators what. This is one reason we do this. Another reason we do this is simple, we use the details ourselves. We use the details to create signatures for our vulnerability assessment tool and firewall. Security administrators then download these signatures and use them to check for patches or to protect systems which can not yet be patched.Administrators don't need this crap to fix their boxes, they simply need the exploit vectors, the possible mitigation steps, and the potential severity of the vulnerability. No sysadmin should have time, nor care about the call made to localalloc, the decoder functions it effects, etc... The pieces that are needed to make a threat assessment and develop a mitigation strategy, IMHO, are all in your bulletin, and contained in these sections: Systems Affected, Services Affected, Software Affected, Description, Severity. From that it's pretty obvious how bad this one can be, knowing that we can't make people stop using Outlook in a corporate environment, or stop using Internet Explorer to go to several popular sites, or any of the other numerous 3rd party apps that are affected by this. The strategy is simple, patch, patch, patch. That is something that takes time in a large enterprise where you have to worry about the effects it will have on day to day business. You can't just flip a switch and deploy vendor patches the day they come out, I think we all know that Microsoft patches do have bugs from time to time and knowing how these will affect your "officially supported" corporate applications is important. Reducing the safe margin of time that one has to do that IS a problem in my eyes.
<<SNIP>> -- Gregory A. Gilliss, CISSP E-mail: greg () gilliss com Computer Security WWW: http://www.gilliss.com/greg/ PGP Key fingerprint 2F 0B 70 AE 5F 8E 71 7A 2D 86 52 BA B7 83 D9 B4 14 0E 8C A3 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Re: Re: <to various comments>EEYE: Microsoft ASN.1 ... Drew Copley (Feb 11)
- Re: Re: Re: <to various comments>EEYE: Microsoft ASN.1 ... Paul Tinsley (Feb 12)
- Re: Re: Re: <to various comments>EEYE: Microsoft ASN.1 ... Gregory A. Gilliss (Feb 12)
- Re: <to various comments>EEYE: Microsoft ASN.1 ... Ake Nordin (Feb 13)
- Re: Re: Re: <to various comments>EEYE: Microsoft ASN.1 ... Jason Stout (Feb 12)
- [Full-Disclosure] RE: [kinda-but-not-really-Full-disclosure-so-we-feel-warm-and-fuzzy] Re: <to various comments>EEYE: Microsoft ASN.1 ... Brett Moore (Feb 12)
- Re: Re: Re: <to various comments>EEYE: Microsoft ASN.1 ... Gregory A. Gilliss (Feb 12)
- <Possible follow-ups>
- RE: Re: Re: <to various comments>EEYE: Microsoft ASN.1 ... Drew Copley (Feb 12)
- Re: Re: Re: <to various comments>EEYE: Microsoft ASN.1 ... Brian Eckman (Feb 12)
- RE: Re: Re: <to various comments>EEYE: Microsoft ASN.1 ... Kenton Smith (Feb 12)
- RE: Re: Re: <to various comments>EEYE: Microsoft ASN.1 ... Drew Copley (Feb 12)
- Re: Re: Re: <to various comments>EEYE: Microsoft ASN.1 ... Paul Tinsley (Feb 12)
