CERT alert? 

Bugs in authorized programs cause problems all the time. IBM even has a 'red 
alert' newsletter to quickly inform the community when a bug in their code 
poses a serious threat. 

This is a key reason why update access to authorized libraries has to be 
tightly controlled.       

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:ibm-m...@bama.ua.edu] On Behalf Of 
P S
Sent: Thursday, September 24, 2009 10:09 AM
To: IBM-MAIN@bama.ua.edu
Subject: Re: Long parms ... again (was: Reading DD card information)

On Thu, Sep 24, 2009 at 10:36 AM, Paul Gilmartin <paulgboul...@aim.com> wrote:
> As an experiment, I tried calling BPXBATCH from Rexx with a 65535-byte
> parm (x'FFFF' in the length field).  It executed without error, and
> correctly processed the entire PARM string.

VERY interesting. So a poorly written authorized program can rape the
system now, if called thus. Nize...

Will keep an eye out for the CERT alert!

 
NOTICE: This electronic mail message and any files transmitted with it are 
intended
exclusively for the individual or entity to which it is addressed. The message, 
together with any attachment, may contain confidential and/or privileged 
information.
Any unauthorized review, use, printing, saving, copying, disclosure or 
distribution 
is strictly prohibited. If you have received this message in error, please 
immediately advise the sender by reply email and delete all copies.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to