[Info-vax] VAX VMS going forward

Simon Clubley clubley at remove_me.eisner.decus.org-Earth.UFP
Tue Aug 4 20:59:46 EDT 2020


On 2020-08-04, Stephen Hoffman <seaohveh at hoffmanlabs.invalid> wrote:
> On 2020-08-04 00:24:43 +0000, David Goodwin said:
>
>> Stuxnet is a good example of this. It used *four* undisclosed security 
>> vulnerabilities in windows plus driver signing keys stolen from two 
>> well known hardware companies plus an undisclosed security 
>> vulnerability in the Siemens WinCC SCADA software.
>
> The SMG $qio local privilege escalation hole was an impressive find.
>

It was also done by people who didn't even know about CTL$A_COMMON
and stuck their shellcode in logicals (IIRC).

If they could still find the SMG vulnerability with that lack of
VMS knowledge, it makes you wonder what their fellow professional
researchers can find if they spend time truly understanding VMS.

Simon.

-- 
Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.



More information about the Info-vax mailing list