[Info-vax] Have the NSA planted backdoors in VMS ?

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Mon Jan 8 18:10:09 EST 2018


On 2018-01-08 22:09:40 +0000, Simon Clubley said:

> Many non-privileged interactive users would be using these systems as 
> well. In that environment, a known interactive privilege escalation 
> method would be a very valuable thing to have.

I'd rather have a path through LOGINOUT or via DECnet, that far back.

There was a hilariously stupid GRPNAM security hole back in the early 1980s.

And many OpenVMS systems and many networks were wide open, as well.

> I wonder if SEVMS had the same vulnerability as well ?

SEVMS was identical to OpenVMS in this and in most other areas.  SEVMS 
activated some latent capabilities, and added a fairly small number of 
executable images, and documented added commands and features.

> BTW, let's assume that this was an accident and not a deliberate 
> backdoor. That means the next question is: did the NSA find out about 
> this during their normal evaluation of systems and then decide not to 
> tell DEC about it ?

If any national intelligence agency is relevant to you and to your 
systems, then you're probably already toast.    Anybody that's really 
interested can "black bags" your servers directly.  Or can compromise 
your systems through your supply chain, or by directly accessing your 
data center, by co-opting your networking, or by co-opting existing 
staff with the necessary access.  Etc.   As for your question?   Any 
discussions and debates of VEP aside, that's not something that anybody 
that knows will likely answer.    Whether it's NSA, GCHQ, FSB or 
otherwise.   Various end-users can and did send in bug reports, and 
still do.   Exploits are valuable to a number of folks and 
organizations well beyond NSA, and with interests in vulnerabilities 
and exploits for both legal and illegal purposes.   VSI hasn't decided 
to set a floor on exploit prices yet, but that's fodder for a different 
discussion.  Folks that are interested in exploits will review the 
source listings and will fuzz the APIs.  Same as usual.  Some agencies 
have other options and alternatives within their jurisdictions.

GRPNAM: http://www.netfunny.com/rhf/jokes/89q4/evild.693.html
VEP: https://www.eff.org/document/vulnerabilities-equities-process-january-2016


-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list