[Info-vax] Creating an open source version of VMS, was: Re: OpenVMS Hobbyist Notification

Simon Clubley clubley at remove_me.eisner.decus.org-Earth.UFP
Wed Mar 11 15:18:53 EDT 2020


On 2020-03-11, Simon Clubley <clubley at remove_me.eisner.decus.org-Earth.UFP> wrote:
>
> The vulnerability is that shells running in supervisor mode have
> access to the privileges of programs which they run (which would
> be a hideous design decision in code written to today's security
> standards.)
>

That needs clarification and would be better rewritten as:

The vulnerability was possible because shells running in supervisor
mode have access to the privileges of programs which they run (which
would be a hideous design decision in code written to today's security
standards.)

The above is a major weakness which still exists in VMS but it is not
an actual vulnerability in isolation. The actual vulnerability was finding
a way to allow non-privileged users to run their own executable shellcode
within the context of DCL itself so the above weakness could be exploited.

The patch just closed off a path I discovered which allowed that ability
for a non-privileged user to run their own shellcode within the context
of DCL itself.

Sorry.

Simon.

-- 
Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.



More information about the Info-vax mailing list