[Info-vax] VMS Software needs to port VAX DIBOL to OpenVMS X86 platform
Simon Clubley
clubley at remove_me.eisner.decus.org-Earth.UFP
Sun Dec 20 20:18:35 EST 2020
On 2020-12-19, Michael C <superseth369 at gmail.com> wrote:
> On Friday, December 18, 2020 at 8:38:58 AM UTC-5, Simon Clubley wrote:
>> On 2020-12-17, Jon Pinkley <jon.p... at gmail.com> wrote:
>> > I am not sure what point you are trying to make. Most of those "products" are not Operating Systems.
>> >
>> Bob is just being Bob. :-)
>> > And the lack of reported vulnerabilities has very little to do with real vulnerabilities.
>> >
>> Thank you. That's another point I wish more people understood.
>
> so you are saying this is invalid
>
> https://www.cvedetails.com/product/4990/HP-Openvms.html?vendor_id=10
That's _exactly_ what I am saying!!!
When VMS has the same number of people probing it daily that Linux
does then you can do that comparison. Until then, the comparison
means absolutely nothing.
BTW, I hope the summary pages for the other CVEs are more accurate
than the one for my CVE is. :-)
Just for the record, the most glaring oversight is in the "Integrity
Impact" section. With my exploit, you can modify whatever you want
and you have _full_ control over what is modified without any limits.
Simon.
--
Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.
More information about the Info-vax
mailing list