funsec mailing list archives

RE: Month of Kernel Bugs - day 1


From: "Craig Schmugar" <craig () getvirushelp com>
Date: Fri, 3 Nov 2006 21:26:44 -0800

Without that exploit code, only select few can protect themselves, if at
all.

In principal I agree with you, but in practice (with public exploit code) I
see few protecting themselves and a bunch exploited.

Without the exploit code, I see few exploited.  Yes, it's hard to assess how
many are affected from an unknown vuln, but I am not aware of a case where
more were affected before an exploit became known compared to after the
exploit was made public.

Many are sacrificed for the good of a few.  Better to have the information
in the hands of the few who can and do protection themselves, than share it
with the world (idealistic, I know).

Additionally, hackers are being taught concepts to go find many more
vulnerabilities, and there's no way vendors can patch at the pace that many
attackers can create exploits.  Attackers are given tools to make the job
easier, and to circumvent mitigation.

So the tools are distributed to create a level playing field, right.  If the
good guys have the tools that the bad guys have, they can anticipate the
attack.  Vendor's QA teams can find the vulnerabilities before products
ship.  Consumers of those products can find the vulnerabilities before
they're attacked.  Security providers can use the tools to create proactive
protection before attacks happen. However, any 1 vendor, consumer, or
security provider can not contend with an army of attackers.  And even if
they could, you're talking about attacking the infinite space.  So you could
find and fix/mitigate tons of vulnerabilities and they may not be the
"right" ones.  Which takes me back to the notion of providing the tools to
the good guys without helping the bad guys.

"Good guys" is not limited to the vendor themselves.  Vendor pressure was
one of your earlier points.  Whomever can apply such pressure can be given
the exploit with the understanding that they may share it with the vendor
and no one else or they will be cut off the next go around.  Or that they
only get the exploit if they agree to pressure the vendor, etc, etc.

So you ask, what about the small fish, how are they to protect themselves?
I'll refer to my earlier statement about the good of the many outweighing
the good of the few, and in most cases I'd argue that those few are at
reduced risk through obscurity.  Plus, even those with the means to protect
themselves often struggle to do so (including the small fish).

Craig

-----Original Message-----
From: Gadi Evron [mailto:ge () linuxbox org] 
Sent: Thursday, November 02, 2006 7:39 PM
To: Craig Schmugar
Cc: 'Fergie'; funsec () linuxbox org
Subject: RE: [funsec] Month of Kernel Bugs - day 1

On Thu, 2 Nov 2006, Craig Schmugar wrote:
[Gadi] You know how insecure you are, and what you need to protect
yourself.
What programs to use, what not to use. What IDS signatures you may 
need, and what  vendor you need to preasure.

[Craig] My point is that the majority of the Internet will not know 
(and subsequently not protect themselves, and not pressure the vendor 
-- most aren't equipped to do so anyway).

[Gadi] Many of these have exploit code in the hands of bad people, so 
YES, we will see worms using this as a direct result, but we will also 
no longer see  many directed attacks using them.

[Craig]
Have to disagree there.  WMF, createTxtRange, MS06-040 etc were abused 
much

I agree with you Craig, but our problem is one of definitions. of the two
above - WMF and createTextRange were both 0days, exploited in the wild
before public disclosure.

more after exploit code was readily available and Blaster and Sasser 
may never have existed if exploit wasn't so public.

I am not saying that hackers don't exploit unpublished vuln, of course 
they do, but the number of victims and amount of damage jumps 
exponentially once that exploit is readily available.  And I can't 
endorse irresponsible disclosure.  One of the arguments for 
irresponsible disclosure is that certain vendors won't release a patch 
or will take too long to release a patch without it.  However, when 
you have 0-day threats like CVE-2005-0944 that have remained unpatched 
for more than 18 months (Ok, maybe this isn't your average 0-day 
response), you have to wonder how strong that argument is anymore [and 
I use this example as it's still an actively exploited remote code
execution vulnerability].

I agree, 100%, that public exploit code is directly responsible for worms
and bots exploiting new vulnerabilities. It's an industry, without this
exploit code, they use something else.

Without that exploit code, only select few can protect themselves, if at
all.

Without that publicity, we would not know we are vulnerable.
The world is changing, unfortunately.

        Gadi.


Craig


-----Original Message-----
From: Gadi Evron [mailto:ge () linuxbox org]
Sent: Thursday, November 02, 2006 12:13 AM
To: Craig Schmugar
Cc: 'Fergie'; funsec () linuxbox org
Subject: RE: [funsec] Month of Kernel Bugs - day 1

On Wed, 1 Nov 2006, Craig Schmugar wrote:
As an educated consumer: yes.

Then I'll add the word "all" to my statement [I might question the 
phrase "these days" in Gadi's statement "you are all more secure 
these days"]

all <> "educated consumer"

Erm, all more secure these days, as a statement, links back to my 
previous words in that paragraph/text.

Why do you disagree, let's open it for discussion.

Craig

-----Original Message-----
From: Fergie [mailto:fergdawg () netzero net]
Sent: Wednesday, November 01, 2006 8:02 PM
To: craig () getvirushelp com
Cc: funsec () linuxbox org
Subject: RE: [funsec] Month of Kernel Bugs - day 1

As an educated consumer: yes.

- ferg



-- "Craig Schmugar" <craig () getvirushelp com> wrote:

Patch patch patch?  What patch?  Last time I checked there were 2 or 
maybe 3 patches available for the 25 IE-related MoBB issues (from July).

So, I might question the phrase "these days" in Gadi's statement 
"you are all more secure these days"

Craig

-----Original Message-----
From: funsec-bounces () linuxbox org 
[mailto:funsec-bounces () linuxbox org]
On Behalf Of Valdis.Kletnieks () vt edu
Sent: Wednesday, November 01, 2006 10:02 AM
To: Gadi Evron
Cc: FunSec [List]
Subject: Re: [funsec] Month of Kernel Bugs - day 1

On Wed, 01 Nov 2006 10:41:17 CST, Gadi Evron said:
And don't anyone dare speak against HD Moore. He is the reason you 
are all more secure these days. Not less so.

Amen to that - fire up Metasploit, build and launch something, and 
then mention that *every* hacker has a copy.  Makes even the most 
recalcitrant user curl up like a breaded prawn and want to go home 
and patch patch patch
;)

(That, and Metasploit building blocks are an *incredible* reference 
if you're building *other* tools to look for either exploits or
payloads.
;)



--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet  fergdawg(at)netzero.net 
ferg's tech blog: http://fergdawg.blogspot.com/

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.



_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.


Current thread: