[Info-vax] DCL vulnerability write up on The Register

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Sun Feb 18 14:28:38 EST 2018


On 2018-02-18 14:51:20 +0000, Phillip Helbig (undress to reply said:

> In article <p6c20f$jje$1 at dont-email.me>, Simon Clubley
> <clubley at remove_me.eisner.decus.org-Earth.UFP> writes:
> 
>> So basically, when you combine the two bits together, a bug in the CDU 
>> parser, combined with a lack of proper checking in DCL, has basically 
>> allowed any interactive user with shell access to totally compromise a 
>> VAX or Alpha system since the mid 1980s.
>> 
>> IMHO, things simply should not be that fragile.
> 
> True.  However, apparently no-one ever did compromise a system in the 
> way you describe.  Maybe because all who were in a position to do so  
> were wearing white hats?

Many attackers aren't known for broadcasting weaknesses they might 
find.   Various vendors silently fix bugs found, too.   Some folks will 
report vulnerabilities that they find, and some vendors will receive 
and respond to and promptly fix the bugs.   Some don't.  Some folks 
stockpile bugs.  Some folks — users or even folks at vendors — can leak 
or can sell vulnerabilities to attackers. All vendors are stuck with 
the calculation around what they can fix and what will disrupt folks 
and what they can't fix due to the expected disruptions or due to 
funding or scheduling conflicts, too.

The US National Security Agency (NSA) leaks certainly provided folks 
with some insights into how vulnerabilities and exploits arise and are 
handled, how they have been used, and how these vulnerabilities have 
been revealed and exploited.





-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list