[Info-vax] Thread on Intrusion/Vulnerability of OpenVMS - Last Spring

VAXman- at SendSpamHere.ORG VAXman- at SendSpamHere.ORG
Sun Jan 17 17:24:04 EST 2010


In article <274720e4-37f2-4359-92a3-776521962155 at b2g2000yqi.googlegroups.com>, BillPedersen <pedersen at ccsscorp.com> writes:
>On Jan 17, 2:39=A0pm, Bob Gezelter <gezel... at rlgsc.com> wrote:
>> On Jan 17, 1:26=A0pm, BillPedersen <peder... at ccsscorp.com> wrote:
>>
>>
>>
>> > On Jan 17, 12:03=A0pm, BillPedersen <peder... at ccsscorp.com> wrote:
>>
>> > > I recall a thread where there was a fellow from the UK who had been
>> > > doing intrusion research on OpenVMS and he had had difficulty getting
>> > > in touch with someone "reliable" at HP. =A0 I am looking for the thre=
>ad
>> > > as it had some arguments I wanted to review. =A0 I believe he was one=
> of
>> > > the authors of the paper presented at DEFCON 16.
>>
>> > > It is not the DEFCON 16 thread as it does not appear that any of the
>> > > authors participated in that thread.
>>
>> > > If anyone can help here I would appreciate it.
>>
>> > > TIA.
>>
>> > > Bill.
>>
>> > I think I am off my 12 months. =A0I suspect the thread was in the Sprin=
>g
>> > of 2008.
>>
>> > Thanks...
>>
>> Bill,
>>
>> Entering "DEFCON 16 OPENVMS" yields a collection of entries, including
>> an August 2008 thread that may be what you are searching for.
>>
>> - Bob Gezelter,http://www.rlgsc.com
>
>Thanks, Bob.  Hoff also sent me a link to his blog on the security
>issues raised by the folks who did the DEFCON 16 presentation.
>
>Bill.

Was this the thread that lead to the eventual patch of SMGRTL?

I have a demonstrator for that "defect" if you are interested.

-- 
VAXman- A Bored Certified VMS Kernel Mode Hacker    VAXman(at)TMESIS(dot)ORG

  http://www.quirkfactory.com/popart/asskey/eqn2.png
  
  "Well my son, life is like a beanstalk, isn't it?"



More information about the Info-vax mailing list