Full Disclosure mailing list archives
FW: Security Index SECURE SOCKETS LAYER COELACANTH: Phreak Phishing Expedition
From: "Clairmont, Jan M" <jan.m.clairmont () citigroup com>
Date: Mon, 14 Jun 2004 16:47:07 -0400
Again we see that a factual and independent index of security vulnerabilities is needed to objectively assess security in a complex environment. I have proposed the Clairmont-Everhardt Index of Security Vulnerability to be that objective measurement. As published earlier, this index could give the Security Manager, CSO or other security personnel some objective measurement as to their actual Network security within a margin of error. Right now there is no known objective security measurements that are generally known. A paper that is forthcoming will propose as a start: the methodologies and objectives metrics that could be used in creating a credible Index of Vulnerability. The higher the Index of Vulnerability the lower the security of the overall computer network. Absolute security is never possible, as Six Sigma is the goal in manufacturing, these methodologies and goals should be used in securing networks on the internet. Any useful ideas and contributions would be greatly appreciated and acknowledged. I look forward to the ensuing discussions and subsequent diversionary humor that always results when a serious security discussion is broached on this rather mendacious forum of paladian mavericks.8-> Jan Clairmont Paladin of Security Firewall Administrator/Consultant -----Original Message----- From: full-disclosure-admin () lists netsys com [mailto:full-disclosure-admin () lists netsys com]On Behalf Of Nick FitzGerald Sent: Friday, June 11, 2004 9:05 PM To: bugtraq () securityfocus com; ntbugtraq () listserv ntbugtraq com; full-disclosure () lists netsys com Subject: [Full-disclosure] RE: SECURE SOCKETS LAYER COELACANTH: Phreak Phishing Expedition "Drew Copley" <dcopley () eEye com> reminded us:
As a addendum, perhaps, though I wouldn't doubt someone might make some nice proof of concept code for this... A similiar issue of this kind was found in IE a few years ago - remember of course - it is IE's fault that they are not properly parsing this, regardless of what they need to parse... so this is ultimately a Microsoft bug... http://groups.google.com/groups?q=group:bugtraq+dns+wildcard&hl=en&lr=&i e=UTF-8&selm=bugtraq/Pine.BSF.4.20.0111142031560.527-100000%40alive.znep .com&rnum=1
I am quite surprised Microsoft did not properly fix this way back then.
Really? Surely you are just being polite? This is entirely consistent with a long line of shoddy "fixes" from Microsoft (and, to be fair, many other vendors). Instead of seeing the "%20 bug" reported by Slemko above for what it turns out it was -- a clear indication something was horribly broken in multiple parts of the codebase where (HTML) URL parsing occurs, it is now quite clear that it was seen as a "there is a problem if '%20' is present in URLs" problem. When "fixing" the %00/binary null issue recently, was _that_ seen for what it really was -- a clear indication there was something horribly broken in multiple parts of the codebase where (HTML) URL parsing occurs? _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- FW: Security Index SECURE SOCKETS LAYER COELACANTH: Phreak Phishing Expedition Clairmont, Jan M (Jun 14)