ET (Eric Thomas, the author of the Revised LISTSERV) told me on VMSHARE m
any, many years ago 
that the underlying cause of most buffer overruns is the C language. The 
basic concept of moving 
characters until you find a x'00' (or CR or LF) will ALWAYS lead to buffe
r overruns. (A number of 
the built-in functions in C have this problem, too.)

Of course, it's possible to write good code in C (and bad code in ANY lan
guage) -- but the same 
damn errors keep popping up over and over and over again in C code in Uni
x and Windows.

To the extent that large parts of the VM TCP/IP stack are written in C, t
he exposure exists. I'm 
sure that IBM is well aware of this, and I hope they have found and plugg
ed all such holes, but 
there can be no guarantee.

What does your security person propose you DO about this possibility? Wha
t does he do for other 
operating systems? Usually the answer is, apply fixes in a timely manner.
 Tell him you do that. 
(You do, don't you?) Tell him that you keep in touch with your colleagues
. Hint that going to 
SHARE would be a good idea, too.

There is an issue here. When a security exposure is found, do you publish
 it or hide it? Most of the 
security world thinks it is better to publish the information -- once a f
ix is available. They deride 
"security by obscurity". IBM, however, does not publish such information 
for VM -- the security or 
integrity APARs contain no information about what is being fixed. 

I'm not going to say this is good or bad -- but it sure makes it hard to 
answer a question such as 
"how common are buffer overruns in VM"?

Personally, I've only seen two security exposures in VM. Neither was due 
to a buffer overflow. 
That's an awfully small sample, though.

Alan Ackerman
Alan -dot- Ackerman -at- Bank of America -dot- com

Reply via email to