[Gadi] You know how insecure you are, and what you need to protect yourself.
What programs to use, what not to use. What IDS signatures you may need, and
what  vendor you need to preasure.

[Craig] My point is that the majority of the Internet will not know (and
subsequently not protect themselves, and not pressure the vendor -- most
aren't equipped to do so anyway).

[Gadi] Many of these have exploit code in the hands of bad people, so YES,
we will see worms using this as a direct result, but we will also no longer
see  many directed attacks using them.

[Craig]
Have to disagree there.  WMF, createTxtRange, MS06-040 etc were abused much
more after exploit code was readily available and Blaster and Sasser may
never have existed if exploit wasn't so public.

I am not saying that hackers don't exploit unpublished vuln, of course they
do, but the number of victims and amount of damage jumps exponentially once
that exploit is readily available.  And I can't endorse irresponsible
disclosure.  One of the arguments for irresponsible disclosure is that
certain vendors won't release a patch or will take too long to release a
patch without it.  However, when you have 0-day threats like CVE-2005-0944
that have remained unpatched for more than 18 months (Ok, maybe this isn't
your average 0-day response), you have to wonder how strong that argument is
anymore [and I use this example as it's still an actively exploited remote
code execution vulnerability]. 

Craig


-----Original Message-----
From: Gadi Evron [mailto:[EMAIL PROTECTED] 
Sent: Thursday, November 02, 2006 12:13 AM
To: Craig Schmugar
Cc: 'Fergie'; funsec@linuxbox.org
Subject: RE: [funsec] Month of Kernel Bugs - day 1

On Wed, 1 Nov 2006, Craig Schmugar wrote:
> > As an educated consumer: yes.
> 
> Then I'll add the word "all" to my statement [I might question the 
> phrase "these days" in Gadi's statement "you are all more secure these 
> days"]
> 
> all <> "educated consumer"

Erm, all more secure these days, as a statement, links back to my previous
words in that paragraph/text.

Why do you disagree, let's open it for discussion.
> 
> Craig
> 
> -----Original Message-----
> From: Fergie [mailto:[EMAIL PROTECTED]
> Sent: Wednesday, November 01, 2006 8:02 PM
> To: [EMAIL PROTECTED]
> Cc: funsec@linuxbox.org
> Subject: RE: [funsec] Month of Kernel Bugs - day 1
> 
> As an educated consumer: yes.
> 
> - ferg
> 
> 
> 
> -- "Craig Schmugar" <[EMAIL PROTECTED]> wrote:
> 
> Patch patch patch?  What patch?  Last time I checked there were 2 or 
> maybe 3 patches available for the 25 IE-related MoBB issues (from July).
> 
> So, I might question the phrase "these days" in Gadi's statement "you 
> are all more secure these days"
> 
> Craig
> 
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
> On Behalf Of [EMAIL PROTECTED]
> Sent: Wednesday, November 01, 2006 10:02 AM
> To: Gadi Evron
> Cc: FunSec [List]
> Subject: Re: [funsec] Month of Kernel Bugs - day 1
> 
> On Wed, 01 Nov 2006 10:41:17 CST, Gadi Evron said:
> > And don't anyone dare speak against HD Moore. He is the reason you 
> > are all more secure these days. Not less so.
> 
> Amen to that - fire up Metasploit, build and launch something, and 
> then mention that *every* hacker has a copy.  Makes even the most 
> recalcitrant user curl up like a breaded prawn and want to go home and 
> patch patch patch
> ;)
> 
> (That, and Metasploit building blocks are an *incredible* reference if 
> you're building *other* tools to look for either exploits or payloads. 
> ;)
> 
> 
> 
> --
> "Fergie", a.k.a. Paul Ferguson
>  Engineering Architecture for the Internet  fergdawg(at)netzero.net  
> ferg's tech blog: http://fergdawg.blogspot.com/
> 
> _______________________________________________
> Fun and Misc security discussion for OT posts.
> https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
> Note: funsec is a public and open mailing list.
> 

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to