On 9 Jun 2010 06:38:50 -0700, in bit.listserv.ibm-main you wrote:

>On Wed, 9 Jun 2010 06:01:51 -0700, Edward Jaffe wrote:
>>
>>I wonder if anyone was able to exploit SMP/E to run arbitrary code in a
>>privileged state?
>>
>You're cruel.
>
>Integrity exposures, like pregnancy, are pretty much devoid of
>degree.  If a program gets in KEY 0, it can modify system control
>blocks.  If it gets in Supervisor state, it can LPSW to KEY 0.
>If it has AC=1, it can MODESET.  If it can update APF libraries,
>it can ...
>
>And IBM considers the SMP/E problem fixed merely because they told
>customers, "Don't do that!"  Even though they haven't told us
>what to not do.
>
>-- gil
>
It gets even better.  If the goal is to invade a system for profit,
knowing the vulnerabilities in Websphere may be sufficient.  It isn't
RACF directly that is preventing me from getting into someone else's
account when I log in to my bank which I believe is on z/OS.  The
advantages of having your own machine to try out hacking is that you
don't alert someone else as to what you are doing.  Figuring out the
vulnerability in SMP/E in and of itself may not be that useful if you
confine yourself to SMP/E because getting that far requires a valid
logon to TSO.  Figuring out where else similar vulnerabilities might
exist from understanding that vulnerability could be profitable.  If
REXX or JAVA can be executed through a web entry (Websphere, another
web server, etc.) then all sorts of interesting things might happen.
In short, the advantage of having your own system to explore
vulnerabilities is that you don't get anyone's security people aroused
when you probe.

Clark Morris

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to