This discussion can go on endlessly. It has been fought time and time again in the past.... BUT... David Schwartz wrote: > > > > Give people a chance to upgrade Gnumeric and I will happilly share the > > > > information with bugtraq (if someone does not read the 10 diffs in the > > > > meantime). > > > > > > I understand your intentions, but I don't think they make > > any sense. > > > > I do not understand what do you mean. Why do you say it does not make > > sense to try (only try) to protect users by not disclosing the > > information now? > Because the way you have left things, only those most strongly > motivated to determine the exploit will know it. Those most strongly > motivated to determine it are those who would exploit it. And you've > left the users in the dark. > > You can trust me in the meantime. Hey, if you are running Gnumeric > > currently you are already trusting me ;-) > > It's not a matter of trusting you. It's a matter of having sufficient > information to determine whether this exploit warrants an immediate upgrade. If the "class" of the problem is disclosed, you should trust others on the issue. Some (like I on my single-user workstations) don't care about local -> root problems. Remote entry problems are non-issues on my standalone machines. Wether or not that information was disclosed in this case, is beside the issue. Most people are not capable of determining wether or not they are vulnerable. I tried it once: Given an exploit, about 50% of the people incorrectly report that they are not vulnerable. Many sysops seem to need to see an exploit work before they agree that they are vulnerable. So, even if the exploit is published, I expect around 50% of the "dumb" (those who insist on seeing a working exploit) sysops to try and fail at running the exploit, and then deciding not to upgrade, "Because they are not vulnerable". A lead-time of a few weeks where vendors/maintainers are notified and enabled to decide on a fix and compile new binaries is not bad. Bugs have been present for months, and the chances of many different people stumbling on the same problem in the same week are acceptably small. After the fix is released, you can count on the exploits popping up reasonably quickly. Reading the diffs isn't that hard. But a vendor/maintainer/finder does no good in releasing the exploit themselves. If upon seeing the exploit not-working on your system, you would decide not to upgrade, your system is vulnerable to the dumb-sysadmin problem. You've already left lots of holes because you weren't able to run a simple exploit. The problem is that you have to take into account that the bad guys might be smarter than you are. So even if your testing shows that the exploit doesn't work, you have to assume that the bad guys can get it to work. So wether or not you get to see the exploit work, you need to take the information at face value. Roger. -- ** R.E.Wolffat_private ** http://www.BitWizard.nl/ ** +31-15-2137555 ** *-- BitWizard writes Linux device drivers for any device you may have! --* ------ Microsoft SELLS you Windows, Linux GIVES you the whole house ------
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:54:34 PDT