Re: [linux-security] [RHSA-1999:023-01] Potential security

From: Rogier Wolff (R.E.Wolffat_private)
Date: Sat Jul 31 1999 - 03:20:08 PDT

  • Next message: Microsoft Product Security Response Team: "Re: ms oledb data links"

    This discussion can go on endlessly. It has been fought time and time
    again in the past.... BUT...
    
    
    David Schwartz wrote:
    > > > > Give people a chance to upgrade Gnumeric and I will happilly share the
    > > > > information with bugtraq (if someone does not read the 10 diffs in the
    > > > > meantime).
    > > >
    > > > 	  I understand your intentions, but I don't think they make
    > > any sense.
    > >
    > > I do not understand what do you mean.  Why do you say it does not make
    > > sense to try (only try) to protect users by not disclosing the
    > > information now?
    
    > 	Because the way you have left things, only those most strongly
    > motivated to determine the exploit will know it. Those most strongly
    > motivated to determine it are those who would exploit it. And you've
    > left the users in the dark.
    
    > > You can trust me in the meantime.  Hey, if you are running Gnumeric
    > > currently you are already trusting me ;-)
    >
    > 	It's not a matter of trusting you. It's a matter of having sufficient
    > information to determine whether this exploit warrants an immediate upgrade.
    
    If the "class" of the problem is disclosed, you should trust others on
    the issue. Some (like I on my single-user workstations) don't care
    about local -> root problems. Remote entry problems are non-issues on
    my standalone machines. Wether or not that information was disclosed
    in this case, is beside the issue.
    
    Most people are not capable of determining wether or not they are
    vulnerable. I tried it once: Given an exploit, about 50% of the people
    incorrectly report that they are not vulnerable. Many sysops seem to
    need to see an exploit work before they agree that they are vulnerable.
    
    So, even if the exploit is published, I expect around 50% of the
    "dumb" (those who insist on seeing a working exploit) sysops to try
    and fail at running the exploit, and then deciding not to upgrade,
    "Because they are not vulnerable".
    
    A lead-time of a few weeks where vendors/maintainers are notified and
    enabled to decide on a fix and compile new binaries is not bad. Bugs
    have been present for months, and the chances of many different people
    stumbling on the same problem in the same week are acceptably small.
    
    After the fix is released, you can count on the exploits popping up
    reasonably quickly. Reading the diffs isn't that hard. But a
    vendor/maintainer/finder does no good in releasing the exploit
    themselves. If upon seeing the exploit not-working on your system, you
    would decide not to upgrade, your system is vulnerable to the
    dumb-sysadmin problem. You've already left lots of holes because you
    weren't able to run a simple exploit.
    
    The problem is that you have to take into account that the bad guys
    might be smarter than you are. So even if your testing shows that the
    exploit doesn't work, you have to assume that the bad guys can get it
    to work.
    
    So wether or not you get to see the exploit work, you need to take the
    information at face value.
    
    			Roger.
    
    --
    ** R.E.Wolffat_private ** http://www.BitWizard.nl/ ** +31-15-2137555 **
    *-- BitWizard writes Linux device drivers for any device you may have! --*
    ------ Microsoft SELLS you Windows, Linux GIVES you the whole house ------
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:54:34 PDT