#include <infodrom.style>

<page title="Infodrom Text - Vorträge">

<h1>Full disclosure of vulnerabilities?</h1>

<p><em>This text is inspired by a discussion on <a
href="http://www.securityfocus.com/">bugtraq</a>.</em>

<ol>

<!-- From: antirez <antirez@invece.org> -->
<li> <a name="point1">Without full disclosure of computer
     vulnerabilities the next time the authors of an exploit may be
     the same guys that discovered the vulnerability, so your
     no-disclosure policy fails anyway, while it creates the condition
     to make the next worm more aggressive, see the next points.</a>


<!-- From: antirez <antirez@invece.org> -->
<li> Full disclosure provides a lot of information to the comunity and
     expirience to make better protecion, more secure code and
     security culture around the world.  It also creates the 'case'
     and the customers will think that maybe that vendor does not
     provide very secure code.  This should stimulate the vendor to
     write better code.

<!-- From: antirez <antirez@invece.org> -->
<li> The lack of full disclosure and proof of concepts exploit helps
     to create an unsane security feeling about the actual software.
     Sysadmin will probably be less responsive upgrading they systems
     so when we reach the point <a href="#point1">1</a> the result is
     very catastrophic.

<!-- From: antirez <antirez@invece.org> -->
<li> A motivated attacker can obtain information about the
     vulnerability anyway, examining the patch in the case of Open
     Source Software (or the differences between the last and the
     current version), so non-disclosure works only for proprietary
     software, without to consider that it is anyway possible to guess
     informations about the vulnerability with two different binaries
     (one patched the second vulnerable).

<!-- From: bodzincm@WellsFargo.COM -->
<li> The Code Red worm is pretty much a carbon copy of a previous worm
     released months before (one that worked on .htr files).  The
     patch for the problem was released long ago and should have
     already been applied by security-conscious admins...  which says
     something about the importance of security to most admins.

<!-- From: bodzincm@WellsFargo.COM -->
<li> Vendors - including but not limited to Microsoft - have a history
     of quietly burying critical problems that aren't fully released
     to the public.  Intel initially claimed that the Pentium math bug
     didn't affect enough people to merit a fix; Microsoft originally
     claimed that NTFS was not vulnerable to file fragmentation; the
     list continues ad infinitum.  Nothing is better for the public's
     interest than full disclosure; it forces (sometimes painfully)
     people to confront problems and deal with them.

<!-- From: Ryan Russell <ryan@securityfocus.com> -->
<li> There is no such thing as partial disclosure.  If you try to
     release nearly no details, then someone else will smell blood,
     and figure out the original hole, or find a new one in the same
     area that they will assume is the original hole.  Go read about
     the RDS hole.  If you try no public disclosure, and only release
     to the Right People, it will leak

<!-- From: Bill Arbaugh <waa@cs.umd.edu> -->
<li> It has been found out that the disclosure of the vulnerability
     did not lead to a significant increase in intrusions.  What did
     lead to a significant increase in the intrusion rates was the
     release of an attack script - the automation of the
     vulnerability.  These conclusions were reached by studying
     several intrusion sets.  The <a
     href="http://www.cs.umd.edu/~waa/pubs/Windows_of_Vulnerability.pdf">full
     paper</a> was published in IEEE Computer in December 2000.

<!-- From: Chris Wolfe <9cw4@qlink.queensu.ca> -->
<li> Given the contents of an advisory that does not contain full
     disclosure and a decent debugger, identifying and developing an
     exploit for the overflow is not overly difficult.  Potentially
     time-consuming, but not terrible complicated.

</ol>

<author>misc</author>
</page>

# Local variables:
# mode: indented-text
# end:
