[Info-vax] VMS Software needs to port VAX DIBOL to OpenVMS X86 platform

Simon Clubley clubley at remove_me.eisner.decus.org-Earth.UFP
Sun Dec 20 20:18:35 EST 2020


On 2020-12-19, Michael C <superseth369 at gmail.com> wrote:
> On Friday, December 18, 2020 at 8:38:58 AM UTC-5, Simon Clubley wrote:
>> On 2020-12-17, Jon Pinkley <jon.p... at gmail.com> wrote: 
>> > I am not sure what point you are trying to make. Most of those "products" are not Operating Systems. 
>> >
>> Bob is just being Bob. :-)
>> > And the lack of reported vulnerabilities has very little to do with real vulnerabilities. 
>> >
>> Thank you. That's another point I wish more people understood.
>
> so you are saying this is invalid
>
> https://www.cvedetails.com/product/4990/HP-Openvms.html?vendor_id=10

That's _exactly_ what I am saying!!!

When VMS has the same number of people probing it daily that Linux
does then you can do that comparison. Until then, the comparison
means absolutely nothing.

BTW, I hope the summary pages for the other CVEs are more accurate
than the one for my CVE is. :-)

Just for the record, the most glaring oversight is in the "Integrity
Impact" section. With my exploit, you can modify whatever you want
and you have _full_ control over what is modified without any limits.

Simon.

-- 
Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.



More information about the Info-vax mailing list