Hi Pedro, Well, it is customary, and actually it makes sense, to inform MS first. Give them time to analyse your findings, and give you a response. If they tell it is going to be fixed, wait with disclosure until it is fixed, at least.
I can't answer the legal question. I am not a lawyer, I do not know where in the world you are and, most importantly, I do not know what you did to research this. And, it will not make you a rock star, you would have to play guitar for that. Sincerely, Jasper Verstuurd vanaf mijn iPad > Op 13 dec. 2013 om 03:02 heeft Pedro Luis Karrasquillo > <[email protected]> het volgende geschreven: > > Humans, Dwarves, Elves, Fairies and all free folk on this list: > > Meli Kalikimaka. > > I think I found a relatively small bug with Windows Server running DNS with > recursion turned off, that still allows the server to be used for DDOS > amplification attacks. There are a sizable number of these on the net, and I > do not think operators realize that the server is not totally silent with > recursion turned off. > I want to put my findings here on the list, as well as on my blog but I am > unsure if : > > 1. should I tell MS first? > 2. being this is possibly my first bug as a researcher, will this get me into > trouble (legal or otherwise)? > 3. will this make me a rock star? > > I have details on the bug, as well as remediation steps. I would not say I > "discovered" it per se, as I found it while studying an attack on a network I > protect, but I do not see it documented anywhere either. > > What say you, Wise List Readers? > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
