Re: ISS Apache Advisory Response

From: Kevin Spett (kspettat_private)
Date: Fri Jun 21 2002 - 12:53:49 PDT

  • Next message: Ulf Bahrenfuss: "Apache Vulnerability through a Proxy?"

    > 1)      Our policy for publishing advisories is to give a vendor 30 to 45
    > day quiet period to provide an opportunity to create a patch or work
    around.
    > If an exploit for the vulnerability appears in the wild, or a patch and
    > work-around is provided by the vendor or ISS X-Force, this quiet period is
    > disregarded and the ISS X-Force advisory is published immediately.
    >
    > In the case of this advisory, ISS X-Force provided an Apache patch and did
    > not see a need for a long quiet period.
    > 2)      The original ISS X-Force Apache Patch did work properly against
    the
    > specific vulnerability described by X-Force, despite claims that it did
    not.
    > The Apache and CERT advisories on their websites have been corrected to
    > reflect this.
    
    If you confirm things with the vendor first, you won't have the kind of
    confusion that ensued.  When WebInspect users called me asking what we meant
    by "the patch supplied by ISS is disputed by the Apache Software Foundation"
    I had to explain to them that basically they had the choice of shutting down
    their production servers or deciding to trust a patch that wasn't confirmed
    by Apache.  I'm sure many other security professionals and system
    administrators had similar experiences.
    
    > 3)      ISS was not aware of other researchers discovering this
    > vulnerability nor aware of it in the wild at the time of the release of
    the
    > advisory.
    > 5)      The Gobbles' exploit has confirmed our decision to release as soon
    > as possible based on our assumption that others were likely to discover
    the
    > same vulnerability in the wild.
    
    Did you assume that other people had discovered this or not?  Playing this
    "Well, we had no PROOF that is was known but we ASSUMED that it did so we
    can behave in whatever way we want and justify it with either one" game is
    silly.
    
    > 6)      We do not view this as a race to beat other researchers to
    releasing
    > an advisory, but a race to protect our customers in a timely manner.
    
    Chris Rouland's statements to CNN
    (http://www.cnn.com/2002/TECH/industry/06/18/computer.security.ap/index.html
    ) make me doubt this:
    "Complicating the matter, Rouland said he didn't trust Cox, who along with
    his Apache duties is the senior director of engineering at Red Hat Software,
    which distributes the Linux operating system. Rouland accused Red Hat of
    taking credit for earlier ISS research. "
    This is clearly simple, petty jealousy before responsibility.  You want
    credit just like everyone else does, of course, but come on... And Apache
    did give proper credit after all.
    (http://httpd.apache.org/info/security_bulletin_20020620.txt)
    
    > Due to the general nature of open-source and its openness, the virtual
    > organizations behind the projects do not have an ability to enforce strict
    > confidentiality.  By notifying the open source project, its nature is that
    > the information is quickly spread in the wild disregarding any type of
    quiet
    > period.  ISS X-Force minimizes the quiet period and delay of protecting
    > customers by providing a security patch.
    
    This is obviously ridiculous.  It sounds like something Microsoft would say
    in one of their FUD campaigns.  This gist here is that open-source software
    projects are inherently incapable of confidentiality in dealing with
    sensitive issues.  I suppose all of the Apache users in the world would have
    instantly known if you had sent an email to the lead developers?  Throwing
    out garbage terminology like "virtual organizations" is marketting and
    business talk that doesn't belong on Bugtraq.  I know just as well as anyone
    else reading this list that any organization is made up of people and people
    can be dealt with like people.  If the group of people that had known about
    the issue had gotten large enough that it spread to someone that developed
    an exploit using this new information and the exploit in turn began to
    spread and was being used in the wild, you could've released the advisory
    THEN.  But X-Force didn't even bother.  In any case, the WORST that would've
    happened is that a whole bunch of people would've found out about the
    vulnerability before there was a known and confirmed patch available-- which
    was exactly what happened when X-Force DIDN'T notify Apache.  If your above
    theory held water (and assuming Mark Cox wasn't lying) we all would've known
    about the vulnerability before three days ago because it was previously
    reported.  Clinging to that argument after the fact is absurd.
    
    
    
    Kevin Spett
    SPI Dynamics, Inc.
    http://www.spidynamics.com
    



    This archive was generated by hypermail 2b30 : Fri Jun 21 2002 - 15:55:37 PDT