[22205] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Can we afford full disclosure of security holes?

daemon@ATHENA.MIT.EDU (Chris Wolfe)
Fri Aug 10 21:31:44 2001

Message-Id: <4.3.2.7.2.20010810190953.049ba370@qlink.queensu.ca>
Date: Fri, 10 Aug 2001 20:20:02 -0400
To: "BUGTRAQ@SECURITYFOCUS. COM" <BUGTRAQ@securityfocus.com>
From: Chris Wolfe <9cw4@qlink.queensu.ca>
In-Reply-To: <00b001c121c0$a1161160$0f01a8c0@tiac.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed

I assume this complaint is regarding eEye's initial advisory, rather than 
their later-published analysis of Code Red.

Given the contents of Microsoft's advisory and a decent debugger, 
identifying and developing an exploit for the overflow is not overly 
difficult. Potentially time-consuming, but not terrible complicated.

Moreover, unless I am misreading the analyses, the original eEye exploit 
uses a jump to a header containing a slide to execute code, while RedAlert 
jumps to the request body via msvcrt. Hardly closely related approaches. I 
would strongly question the assumption that RedAlert and variants were all 
based on the code released by eEye.

I would like to thank the folks at eEye for providing full advisories of 
security issues. As the one responsible for regression testing around here, 
knowing the actual flaws makes it much easier (i.e. possible).

Chris

At 02:39 PM 8/10/01, Richard M. Smith wrote:
>[snip]
>Unlike the eEye advisory, the Microsoft advisory on the IIS
>security hole shows the right balance.  It gives IIS customers
>enough information about the buffer overflow without giving a recipe
>to virus writers of how to exploit it.
>
>Thanks,
>Richard M. Smith
>CTO, Privacy Foundation
>http://www.privacyfoundation.org


home help back first fref pref prev next nref lref last post