Vulnerability Development mailing list archives

Re: 0-day exploit..do i hear $1000?


From: foob () return0 net
Date: Fri, 19 Oct 2001 14:45:42 +0000 (GMT)


To simplify, there are two reasons to be in the IT security world:  to
improve computer security, or to use bad computer security as a means to
an end (theft, extortion, ...).

Security companies fall into the first category.  People pay them to help
improve their network and computer security.  They do this, roughly, by
advising on network architecture, operating system/application
security, etc.

Advisories are generated, sometimes with exploit code, to make a vendor
aware of a problem.  The vendor can fix the problem and issue a
patch.  This is all good for the former scenario above, where the aim
is to improve security.  

If exploits returned to the underground, the security companies could
still operate.  If advisories werent released (caused by the fact the
exploits arent publicly released) then computer security would suffer.

But security companies dont need some 0day script to exploit a
vulnerability, they just need to know about the vulnerabilities.  
Designing networks doesnt need exploits, writing firewall rulesets doesnt
need exploits, implementing a corporate security policy doesnt need
exploits.  Knowledge of vulnerabilities in services offered on that
network is needed, but this too doesnt need exploits.

Why would a security firm pay someone any money at all for an
exploit?  They buy it, it roots their clients, but there is no recommended
way of fixing it - the vendor doesnt know so theres no patch.  The only
solution would be to buy the 'rights' to it, and inform the vender,
cooperate, and get the patch out.  But then the sellers would only sell
one copy; once the vuln is public noone else needs the actual exploit
code.

And this leads to the conflict in the above two views of the security
world. 

It makes sense for security firms (people in the business making money) to
actively share their research.  They work with vendors and improve their
customers security.  They will never know if their customers are totally
secure, because there could be a exploit out for something that hasnt been
researched by the firms yet.  But they'll get there eventually.

So maybe its like a race.  

Firms dont need to buy exploits, but they should recruit people into their
r&d labs to find bugs. 

In the race, i wonder who is faster - the people getting paid and
rewarded, or the leeto underground people who get little fame, little 
money. 

People simply don't read advisories, and never apply patches.

I guess security consultant firms read advisories very closely.  And i
guess clients install patches when the consultants inform them of the
vulns.


If people in the 'underground' want to use their skills to make money
either help improve computer security (and get a job in some r&d lab), or
rob a bank with your unreleased exploit.  The former option is probably
more sensible tho...

- foob



Current thread: