On 12 July 2017 at 12:21, Charles Mills <charl...@mcn.org> wrote:

> It's not the malware you know about that should worry you the most. The
> phrase "zero day exploit" comes to mind.

With something as old as z/OS 1.4 it's not even just zero-days. There
are several well known gaping holes in z/OS that have been fixed by
IBM in recent releases. In many cases these fixes are quietly issued
as "security" with no detail, but in others it's virtually impossible
to describe changed behaviour necessitated by the fix without at the
same time giving away the vulnerability. For example (and discussed
here at some length), until recently it was possible for anyone to use
the UNIX execmvs() service to invoke a module in an authorized state
and pass a PARM string of arbitrary length. So any AC(1) module in
linklist (at least) could be attacked this way, and there is no
shortage of them that are vulnerable. Has this been fixed in z/OS 1.4?
It's not impossible that IBM pushed it back, with all it's required
new infrastructure, but I doubt it.

Tony H.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to