Good points, John.  It would be interesting to know (not that they'd tell
us) how much attention is given by BMC during a development cycle to address
anticipated security concerns to not only the product, but the connectors.
My own development experience, coupled with what little I know of BMC
development practices, would tell me that it's probably not much, unless
specific requirements were given prior to development, or an individual
developer happened to color outside the lines a bit.

I suppose an argument could be made that that level of effort is
justifiable, given the low risk already mentioned here, but one hopes that
the powers that be don't plan on that as a long-term strategy apart from
accompanying and constant vigilance.

Rick

-----Original Message-----
From: Action Request System discussion list(ARSList)
[mailto:[EMAIL PROTECTED] On Behalf Of John Baker
Sent: Saturday, January 20, 2007 4:12 AM
To: [email protected]
Subject: Re: Remedy Vulnerability

Dave, Rick, 

Interestingly, we briefly covered the way in which hackers operate, and
that's frequently through the remote execution of code through buffer
overflows. An assumption has been made that this is not so much of an issue
with Remedy as it exists inside the corporate network, and on the long list
of things that Mr. Bad Guy may wish to attack, Remedy is near the bottom. 

However, there is an increasing number of people who are running the Midtier
live on the Internet. Hence, I wonder if BMC has actually done some serious
security testing on both the Midtier and the AR System - in particular, for
buffer overflows in the login parameters? I define serious as, "We took a
bunch of well respected C/Unix hackers and told them to start hacking". 

The problem doesn't stop at the AR System. How old are the LDAP libraries
used by the AREA plugin? What other libraries are used by the AR System that
have been perhaps over looked? A buffer overflow could easily exist in some
external library, but trigged through the use of the AR System (or any other
product installed that makes use of the library).

While this is entirely speculative, the security of systems should always be
taken seriously, and more often than not, it's not.

Although, if your aim is to simply extract data from Remedy (or any other
username/password application), it's often easier to just guess the
password.


John

Java System Solutions : http://www.javasystemsolutions.com

____________________________________________________________________________
___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the
Answers Are"

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the 
Answers Are"

Reply via email to