BugTraq
Re: DJB's students release 44 *nix software vulnerability advisories Dec 20 2004 11:14PM
Jonathan T Rockway (jrockw2 uic edu) (7 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 09:22PM
laffer1 (laffer1 mail foolishgames com) (1 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 22 2004 06:06AM
Jonathan Rockway (jrockw2 uic edu)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 09:11PM
Thor (thor hammerofgod com)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 08:50PM
Dave Holland (dh3 sanger ac uk) (1 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 09:55PM
sean (infamous41md hotpop com)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 08:34PM
milw0rm Inc. (milw0rm gmail com) (2 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 11:58PM
Jack Lloyd (lloyd randombit net)
Re: DJB's students release 44 *nix software vulnerabilityadvisories Dec 21 2004 09:30PM
Antoine Martin (antoine nagafix co uk) (1 replies)
Re: DJB's students release 44 *nix software vulnerabilityadvisories Dec 22 2004 12:23PM
Chris Paget (ivegotta tombom co uk)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 08:22PM
Stephen Harris (bugtraq spuddy org)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 08:14PM
Raymond M. Reskusich (reskusic uiuc edu)
On Mon, Dec 20, 2004 at 05:14:22PM -0600, Jonathan T Rockway wrote:
> Two points.
>
> Regarding local versus remote, look at it this way: You have a 100%
> secure system. Then you install NASM. Now a user FROM THE NETWORK can
> send you some tainted assembly code for you to assemble and he can
> compromise your account. That is why it is considered remote. Local
> would mean that I, the attacker, need an account on the target machine to
> compromise the target account. In this nasm case, I do not need an
> account. That is why the wording "remote" was chosen.

What you really have is a local exploit that you can sometimes trick a
person into executing for you. Not the same thing as a remote
exploit. You as a remote user have no way of compomising the system
without first penetrating the system in some other way. Just because
there is a social engineering method to achieve this penetration does
not make this a remote exploit.

I might add that if a person is assembling an untrusted piece of
assembly code, there is a decent chance that he is planning on
executing it.

>
> Now in regards to full disclosure, I think you should all be happy that we
> bothered to tell you all about these exploits. We could have selfishly
> used them to compromise machines, but instead we wrote them up and mailed
> them off to the users and the authors! That is very nice of us.

Yeah, you know, if the choice is between criminal activity and this
kind of announcement, you did ok, but I think we all assume that people
in the security community want to actually protect users from security
problems. Assuming that this is your goal, I think you can do better.

--
Raymond M. Reskusich
System Programmer/Administrator
CITES/Engineering Workstation Group
University of Illinois at Urbana-Champaign
reskusic (at) uiuc (dot) edu [email concealed]
pgp key id: D9D38030

[ reply ]
Re: DJB's students release 44 *nix software vulnerability advisories Dec 21 2004 07:59PM
David F. Skoll (dfs roaringpenguin com) (2 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 22 2004 03:50AM
Jonathan Rockway (jrockw2 uic edu) (2 replies)
Re: DJB's students release 44 *nix software vulnerability advisories Dec 23 2004 04:49PM
Michal Zalewski (lcamtuf dione ids pl)


 

Privacy Statement
Copyright 2010, SecurityFocus