Dave, Rick, 

Interestingly, we briefly covered the way in which hackers operate, and that's 
frequently through the remote execution of code through buffer overflows. An 
assumption has been made that this is not so much of an issue with Remedy as 
it exists inside the corporate network, and on the long list of things that 
Mr. Bad Guy may wish to attack, Remedy is near the bottom. 

However, there is an increasing number of people who are running the Midtier 
live on the Internet. Hence, I wonder if BMC has actually done some serious 
security testing on both the Midtier and the AR System - in particular, for 
buffer overflows in the login parameters? I define serious as, "We took a 
bunch of well respected C/Unix hackers and told them to start hacking". 

The problem doesn't stop at the AR System. How old are the LDAP libraries used 
by the AREA plugin? What other libraries are used by the AR System that have 
been perhaps over looked? A buffer overflow could easily exist in some 
external library, but trigged through the use of the AR System (or any other 
product installed that makes use of the library).

While this is entirely speculative, the security of systems should always be 
taken seriously, and more often than not, it's not.

Although, if your aim is to simply extract data from Remedy (or any other 
username/password application), it's often easier to just guess the password.


John

Java System Solutions : http://www.javasystemsolutions.com

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the 
Answers Are"

Reply via email to