In a message dated 1/23/2007 7:20:52 A.M. Central Standard Time,  
[EMAIL PROTECTED] writes:
>Prohibit reading beyond DS1LSTAR, and enforce management
of DS1LSTAR  so it is never allowed to point past uninitialized space.




An unauthorized program can read beyond DS1LSTAR quite easily as long as  
allocation builds control blocks describing all allocated tracks rather than  
just those from the beginning of the data set to the track pointed to by  
DS1LSTAR.  An unauthorized program can also read residual data beginning at  
the next 
track after any EOF record written to try to prevent this.  All it  takes is 
EXCP.  IBM would have to add more validity checking into EXCP in  order to 
prevent accesses beyond DS1LSTAR, which would cause big problems for  some 
sophisticated applications, I'm sure.  Higher level access methods,  such as 
BSAM, 
QSAM, BPAM, BDAM, and VSAM all suffer from the same  exposure.  In fact, the 
exposure exists for all access methods, since an  unauthorized program can do 
an 
EXCP to any allocated track mapped in the  TIOT.  Just because you use QSAM 
for most of the application's work does  not mean you cannot have an EXCP in 
there somewhere that uses the same or a  different DCB than that which QSAM is 
using.
 
Bill  Fairchild

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to