Erronous post concerning Backtrack 5 R2 0day Apr 12 2012 08:51PM
Adam Behnke (adam infosecinstitute com) (1 replies)
Re: Erronous post concerning Backtrack 5 R2 0day Apr 13 2012 04:05PM
Jamie Riden (jamie riden gmail com)
On 12 April 2012 21:51, Adam Behnke <adam (at) infosecinstitute (dot) com [email concealed]> wrote:
> Yesterday I made a post concerning a 0day advisory in Backtrack 5 R2:
> http://seclists.org/fulldisclosure/2012/Apr/123
> The posting was incorrect, the vulnerability was NOT in Backtrack but in
> wicd, no Backtrack contributed code is vulnerable. When we tweeted and
> emailed to mailing lists the notifications of this vulnerability, we
> incorrectly shortened the title and called it "Backtrack 5 R2 priv
> escalation 0day ", which is misleading and could lead people to believe the
> bug was actually in Backtrack. The bug has always resided in wicd and not in
> any Backtrack team written code. We apologize for the confusion to the
> Backtrack team and any other persons affected by this error. We feel the
> Backtrack distro is a great piece of software and wish muts and the rest of
> the team the best.

I think some of this kerfuffle could have been avoided if the
backtrack (or wicd) team had been contacted for a response prior to
releasing the bug, as you would expect during a responsible disclosure
process (e.g. see RFPolicy, or just common sense). It would have then
been fairly obvious about who owned the bug, as it were.

It's not an uninteresting issue, but let's follow process a bit better
next please? Better for everyone involved.

Jamie Riden / jamie (at) honeynet (dot) org [email concealed] / jamie.riden (at) gmail (dot) com [email concealed]

[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus