http://www-01.ibm.com/support/docview.wss?uid=swg21682946

*CVE ID: *CVE-2014-3101
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3101>

*Description: *IBM Rational ClearQuest could allow a remote attacker to
bypass security restrictions, caused by an error in the login form. An
attacker could exploit this vulnerability using brute-force techniques to
gain access to a user's account.


On Fri, Jan 23, 2015 at 9:18 PM, Paul B. Henson <[email protected]>
wrote:

> > From: J. Tozo
> > Sent: Friday, January 23, 2015 1:52 PM
> >
> > So you saying if I bruteforce a CAS server with a common password list
> and
> > achieve an authentication within the user h*. that is not a
> authentication
> > bypass?
>
> Yes, that is exactly what I'm saying.
>
> > nice, in your world maybe.
>
> Actually, I believe any competent security researcher or analyst would
> agree with me. Please feel free to find one who does not and reference them.
>
> So from your perspective, if I go bruteforce gmail with your address
> [email protected] and a password list, and eventually determine your
> password, then access your mail with your password that I have discovered,
> I have "bypassed authentication"?
>
> That is ridiculous. When you bruteforce an account, and then access it
> using the credentials you have discovered, you are actually performing
> authentication with those credentials, not bypassing it. Bypassing, if you
> would bother to read the definition I provided, inherently involves
> something not occurring, being routed around, or avoided.
>
> You're not avoiding authentication, authentication is certainly not
> occurring. You are *performing* authentication with valid credentials,
> regardless of how you obtained them.
>
> And the chances of you being able to exploit this issue using the username
> "h*" are infinitesimally small, as there would have to be one and exactly
> one account that starts with an h, as if the wildcard matches multiple
> accounts authentication fails.
>
> So yes, this issue does allow you to potentially specify less than an
> exact username in an attempted authentication. But given the limitation
> that the wildcard must match one and only one account, you need to know so
> much about how the usernames of the entity being attacked are distributed
> it provides minimal excess leverage over a plain jane brute force attack
> using actual usernames.
>
> > You can cry, kicking around, panic, call me incompetent or whatever ad
> > hominem you want
>
> Actually, I am writing clear, grammatically correct, and well presented
> logical arguments and analysis making my case. It is rather you who are
> projecting the image of a child in a tantrum beating their hands and feet
> on the ground because someone has the audacity not to agree with them.
>
> > this still is an authentication bypass.
>
> No, it is not. And if you want to make anybody believe it is, you're going
> to need to do more than just keep crying "Yes it is! Yes it is! Yes it
> is!", you are going to need to present an actual analysis and logical
> argument demonstrating how this vulnerability meets the security industry
> standard understanding of bypassing authentication. You haven't done that,
> and you won't be able to do that, because it does not.
>
> > If you dont agree,
> > ask the dev team to rollback the update
>
> That would be silly. I've never once claimed this was not a bug, nor that
> it did not deserve to be fixed. It absolutely is a bug, and I wouldn't even
> argue it is not a security bug. However, it is a minimal issue with minimal
> exposure and little vulnerability in practice. It did not deserve being
> treated like a critical issue requiring immediate attention.
>
> > and ask mitre to revoke the CVE.
>
> I suppose I wouldn't even argue it doesn't deserve a CVE, at least if the
> description were accurate and actually contained an analysis of the
> underlying issue. But a CVE attached to your drivel? That probably should
> be revoked.
>
> > And last, this flame will lead us to nowhere, haters gonna hate and i
> will not feed
> > this troll anymore.
>
> Nothing will make me more happy than if you stop beating this dead horse
> and wasting my time. You wrote a poorly constructed inaccurate CVE with
> minimal analysis and an artificially inflammatory title that resulted in a
> rushed security announcement mischaracterizing the vulnerability. Deal with
> it. Try to do better next time.
>
> Also, I'd have to care about you to hate you ;), so drop the persecution
> attitude.
>
> --
> Paul B. Henson  |  (909) 979-6361  |  http://www.cpp.edu/~henson/
> Operating Systems and Network Analyst  |  [email protected]
> California State Polytechnic University  |  Pomona CA 91768
>
>
>
> --
> You are currently subscribed to [email protected] as:
> [email protected]
> To unsubscribe, change settings or access archives, see
> http://www.ja-sig.org/wiki/display/JSG/cas-user
>
>


-- 
Grato,

 Tozo

-- 
You are currently subscribed to [email protected] as: 
[email protected]
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-user

Reply via email to