> On behalf of ICSA Labs, I would also like to thank Mikael for working > with us to ensure that the vendors in the program had time to address > this issue before the exploit was announced. He made sure we > understood the issue and took the time to document it thoroughly. > This enabled us to give the vendors enough information to reproduce > the issue and deliver fixes if needed. It also went a long way in > facilitating the initial contact with CERT. > > It is this type of partnership we welcome and encourage in the > future. > > Brian Monkman In comparison, being on the other side of CERT for a couple of un-named BSD's, information seemed to flow very badly, if at all. I don't know who's to blame for that but it is not something that made my life easier or more enjoyable. Obviously a case of where trying to use the "correct channels" failed (at least from my perspective.) I look at CERT's information for Sun and it mentions "in.ftpd". Hmmm, maybe I'm wrong to be concerned if Sun are responding to it for in.ftpd and not SunScreen ;-) Back to the information/exploit... The first test program I received didn't even compile, never mind work, the second was better but even having people say (in other forums) that ipfilter was vulnerable, I failed to make it happen no matter who's ftpd I used or whic "suspect" version of IPFilter I used. I guess the ability to declare code vulnerable by inspection doesn't compare to actually doing a real live test On top of that, the note I received mentioned "selective ACK". If you go and lookup what "selective ACK" in TCP is, you'll find information on something completely different to what was done with this "exploit". Sometimes it just sucks big time when working on free projects where you don't get help that's afforded to vendors such as that ISCA obviously made available. Envious? Definately. Darren _______________________________________________ firewall-wizards mailing list firewall-wizardsat_private http://honor.icsalabs.com/mailman/listinfo/firewall-wizards
This archive was generated by hypermail 2b30 : Wed Oct 09 2002 - 13:44:32 PDT