> From: J. Tozo
> Sent: Friday, January 23, 2015 3:35 PM
> 
> http://www-01.ibm.com/support/docview.wss?uid=swg21682946

Nice try (just to be polite), but sorry, fail.

The title of the IBM bulletin is "Brute-force attack in ClearQuest Web". The 
detailed description is "IBM Rational ClearQuest could allow a remote attacker 
to bypass security restrictions, caused by an error in the login form. An 
attacker could exploit this vulnerability using brute-force techniques to gain 
access to a user's account."

The actual CVE (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3101) 
description is "The login form in the Web component in IBM Rational ClearQuest 
7.1 before 7.1.2.15, 8.0.0 before 8.0.0.12, and 8.0.1 before 8.0.1.5 does not 
insert a delay after a failed authentication attempt, which makes it easier for 
remote attackers to obtain access via a brute-force attack."

So exactly what in any of that are you interpreting as "bypassing 
authentication"? While the IBM description does indeed include the word 
"bypass" (but note the actual CVE does not), it says the issue allows you "to 
bypass security restrictions", not "bypass authentication".

If you actually read the bulletin, you will see the problem under discussion is 
that the web form did not have any mechanism to alleviate against a brute force 
attack. You could feed it usernames and passwords as fast as the network would 
allow you to. Honestly, I don't even know if that could be classified as an 
"error in the login form" so much as the lack of an anti-brute forcing feature.

While you did manage to find a document that contained the words "bypass", 
"bruteforce", and "authentication", it really has no bearing on your CVE nor in 
any way supports or defends your position that your CVE in any way describes a 
vulnerability that "bypasses authentication". For the most part, your 
presentation of this document simply further solidifies my opinion on your lack 
of understanding of security concepts and basic terminology, as well as your 
inability to analyze and properly classify security vulnerabilities.

But feel free to try again. I suppose shooting fish in a barrel isn't very 
sportsmanlike, but sometimes it does offer a perverse level of enjoyment. And 
perhaps is even a bit cathartic after the annoyance you caused me yesterday 
morning.

--
Paul B. Henson  |  (909) 979-6361  |  http://www.cpp.edu/~henson/
Operating Systems and Network Analyst  |  hen...@cpp.edu
California State Polytechnic University  |  Pomona CA 91768



-- 
You are currently subscribed to cas-user@lists.jasig.org as: 
arch...@mail-archive.com
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-user

Reply via email to