Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Chris Stromblad (csoutpost24.com)
Date: Wed Jul 18 2007 - 03:37:07 CDT
-----BEGIN PGP SIGNED MESSAGE-----
What exactly constitutes a 0day? From my perspective naming a
vulnerability 0day have absolutely no value whatsoever, it just doesn't
make any sense. 0day for who? The person who release it, sure, but for
the security community as a whole... nah.
I'm also personally starting to question the whole idea behind public
disclosure and advisories. Do they actually mean anything these days?
What good is it to know about a vulnerability that was "discovered" 6
months ago? The important thing is to know what can be done BEFORE the
patch has been released.
Also a big portion of "advisories" seem to be related to the most
obscure softwares and home made PHP applications that most of us never
even care about anyway. These advisories clutter the ones that have even
the slightest validity.
One more thing about "advisories". I think it would be better to release
them immediately and let people know what they are facing. With public
dissemination of a vulnerability perhaps someone will release a 3rd
party patch or another inventive way of protecting oneself. Holding it
"secret" really doesn't help anyone. If anything it prevents people from
trying to find a way to fix the vulnerability.
Michael Zalewski is in my opinion someone who is using the bug-traq list
in a way that is meaningful. He brings up topics for discussion that
concern us all. More people should do that.
Anyways, enough ranting.
Gadi Evron wrote:
> On Sat, 14 Jul 2007, Dragos Ruiu wrote:
>> On Tuesday 10 July 2007 08:53, Gadi Evron wrote:
>>> To paraphrase Guninski, this is still not a 0day. It is a vulnerability
>>> being disclosed.
>> You're being pedantic Gadi. :-)
>> We have to accept the term "0day" has passed into
>> the realm of meaningless nebulousness along with
>> "hacker" and other misused terms.
>> If we are to be pedantic, the original meaning of
>> 0day is new warez release :-).
> I think there is still hope for us buddy, at least when professionals
> make releases.
> For example, instead of saying I'm being pedantic on this (which I am),
> you could (also, in addition) reply and say "yep" or "nope", thus
> contributing to some discussion. Meaning, we would either make a stand
> for our profession or at the very least get educated as we go along.
> Some people believe the way to reach a "mature industry" is time, others
> believe it's training or in a more specific fashion, certifications. I
> don't know what the answer is, and I am sure it isn't terminology (or
> certifications, hehe).
> I do know though, what a 0day is, and don't intend to compromise it for
> the sake of what the press makes of it. It's a strong term and concept
> which shouldn't be abused. That or we can decide on a new term for what
> 0day used to mean. How about "blubla"?
> From professionals, we can expect good language and for their work to
> speak for them. We shouldn't compromise on silly things like what 0day
> Maybe I will give this up next year, but for now, advisories named
> "0day" have disapeared lately. Maybe peer pressure does have some effect.
> The above is over-thinking and some could consider it very silly, but
> for now, I believe in it. It's just like I resent those among
> consultants who conduct themselves in a fashion that makes me ashamed of
> my profession, as a far-off analogy.
>> World Security Pros. Cutting Edge Training, Tools, and Techniques
>> Tokyo, Japan November 29/30 - 2007 http://pacsec.jp
>> pgpkey http://dragos.com/ kyxpgp
Chris Stromblad (CEH)
90 Long Acre
London, WC2 E9RZ
Tel: +44 (0) 207 849 3097
Dir: +44 (0) 208 099 6595
Fax: +44 (0) 207 849 3140
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.5 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
-----END PGP SIGNATURE-----