From what I understood about this bug, it was irrelevant for Mozilla 
RC-1 because the exploited feature was not working at all there (i.e. - 
the bug was there, but another bug prevented exploiting the first one).

I am using debian sid, and they carry nightly mozilla builds (mine is 
from 20020502, as can be seen from the "user-agent" string in this email).

As far as I understood from the bugtraq posting, they tried to contact 
someone at mozilla (rather than submit the bug to bugzilla). This is 
standard responsible full disclosure procedure, which mozilla was 
probably not set up to follow (the procedure was built with commercial 
companies in mind, not open transparent development processes and bug 
systems).

As a side note - I am begining to lose hope with securing a platform. I 
used to be able to say certain distributions make frequent security 
updates, and that this is the only real protection. However, I since 
amended this saying to add "and you need to support their automatic 
update to not halt your services". This new addition automatically 
disqualifies Microsoft (they have, on several occasions, posted updates 
that broke functionality, and they also posted updates that were not 
included in the automatic update mechanism). I have also had an occasion 
in the past where RedHat's up2date mechanism completely broke 
functionality of a desktop machine, so I am a bit hesitant to trust 
RedHat on this (anyone can give counter experience?).

I am coming more and more to the conclusion that the only way is to 
forego functionality, and even that doesn't always save you (what good 
is saying "don't use telnet, use SSH" if ssh has had exploitable bufer 
overruns itself?).

I'll start a comparison table, and I'm asking the list to help me fill 
it in:


      Microsoft (W2K and Win XP server):

*Unattended update mechanism*: I don't know (is "Windows Update" 
scriptable?)
*Packages are protected against DNS poisening*: Yes
*Update mechanism reliability reputation*: Very bad - patches take time 
to be included even after they are released. Machines regularily stop 
working after updates.
*Responsivness to problems*: Mediocre

Please note that responsivness and reliability are a tradeoff, but MS is 
doing poorly on both.


      *OpenBSD*:

*Unattended update mechanism*: I don't know for sure, but I think not.
*Packages are protected against DNS poisening*: As far as I know updates 
are distributed source only, so the answer is probably not.
*Update mechanism reliability reputation*: Very good, but I don't have 
many sources on this.
*Responsivness to problems*: Usually high


      RedHat:

*Unattended update mechanism*: up2date
*Packages are protected against DNS poisening*: RPMs are opionally 
signed, but I don't think up2date can be configured to reject unsigned 
RPMs. I don't even know whether it verifies the signature.
*Update mechanism reliability reputation*: Bad personal experience, but 
not in a server. Anyone using it?
*Responsivness to problems*: ?


      Debian:

Debian's table seem to be version dependant. There are fluctuations 
between sid, woody and potato.
*Unattended update mechanism*: apt-get. It has the extra capability of 
adding third parties to the update mechanism. They can also upgrade 
majour versions (i.e. - from potato to woody). On the down side, the 
output from the upgrade scripts is not easy to automatically script 
(though possible).
*Packages are protected against DNS poisening*: debs are signed using 
gpg. There is a package containing the signatures of all debian 
developers. However, apt does not have an option to verify the 
signatures. A script workaround may be possible, but the default answer 
is "no".
*Update mechanism reliability reputation*: Very high. Debian maintainers 
on the stable release are extremely careful not to break anything. Apt 
on stable will not upgrade you to a new version if security problems 
have been discovered in the old one, but will rather install a patched 
older version that is not vulnerable. This causes false positives when 
scanning for vulnerabilities, but means your server doesn't break 
functionality or upgrades unexpectably.
*Responsivness to problems*: Usually high, with at least one recorded 
glitch.


      Sun:

*Unattended update mechanism*: Not that I'm aware of.
*Packages are protected against DNS poisening*: No. Regular HTTP download
*Update mechanism reliability reputation*: Never heard of problems.
*Responsivness to problems*: ?

Ok, if you can give me your input (anyone using Mandrake or Suse as 
servers here?).


Tzafrir Cohen wrote:

>Hi
>
>It seems that recently a meduim security hole was exposed in mozilla:
>allows a server to read local files.
>
>See the origianl advisory:
>
>  http://sec.greymagic.com/adv/gm001-ns/
>
>as well as lwn.net's short summary:
>
>  http://lwn.net/2002/0502/security.php3
>
>Anybody here happens to know more about the ways in which GreyMagic tried
>to inform Netscape of this flaw (according to ther advisory)? The bugs in
>the bugzilla were only opened (immediatly) after the annoncement of this
>advisory.
>
>Regarding a promptly fix: A fix to the nightly build was ready almost
>immedietly. But what about existing versions?
>
>I stil see no relation to that in nither netscape's site nor in
>mozilla.org. From what I understand from mozilla it will be fixed in the
>next release candidate (or will it be 1.0?). Of course, mozilla is at a
>beta phase, and any release is a bugfix release.
>
>What distros come with volnurable versions of mozilla that should be
>updated ASAP?
>
>  
>




=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to