Robert,

> Certain "security classes" will actually tell you it is GOOD to provide

No, they won't. I'd suggest joining a serious security news group/mailing list 
if you want to test your theory.

If we're honest, there are probably many vulnerabilities with Remedy, but it's 
never become a 'focus of attention' in the world of people who set out to 
exploit systems. If Remedy were on millions of desktops, or open to the real 
world, it would be far more likely that someone would notice and pay some 
attention. But with the huge number of poorly administered servers in the 
world, there's no point expending any effort.

Midtier 5.x/6.0 was indeed a pile of bugs - I recall the 'delete attachment' 
functionality could be used to delete local files on the server. Even the 
most junior of developers would have implemented a set of checks for this 
kind of problem. 

Midtier 6.3+ is pretty much a re-write (although there is some legacy stuff, 
for a reason that escapes me), and hence while a set of problems go away, a 
bunch of problems probably exist (but haven't been discovered). The sheer 
amount of Javascript in use would imply there are many cross site scripting 
exploits that one may deploy.

Aside from MT we could look at the ARS itself. Again, given it's a system 
that's used by such a small number of people (in comparison to say, Apache, 
PHP, Python, Sendmail, Bind, various Perl applications, IE, etc.,) then it's 
safe to assume that no-one has really tried to 'break it', and if some of 
these security gurus tried, it's safe to assume they would.

The bottom line is, if one had 12 hours to spend on writing a new worm, would 
you attack one of the new services in Vista or the AR System? The former 
humilates Microsoft (again) and inconveniences millions, and the latter 
doesn't do an awful lot for anyone. 



John

Java System Solutions : http://www.javasystemsolutions.com

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the 
Answers Are"

Reply via email to