El 08/10/2010 17:07, Ton Voon escribió:

On 8 Oct 2010, at 15:45, Jose Luis Martinez wrote:
To Mr. Kang:
Thanks for the report, but, please do not disclose vulnerabilites in
public forums without giving the vendor a chance to fix them before.
This way security updates get distributed in a timely fashion and
everybody benefits from your work in an ordered way.


I wouldn't want Mr. Kang to be offended. He did a great job, took the time to test for security, and a bothered to update the vendor. The way may not have been correct only IMHO, and I understand there are defenders of "Full disclosure" and "Bug Secrecy", and even people in between!

http://googleonlinesecurity.blogspot.com/2010/07/rebooting-responsible-disclosure-focus.html Is a nice article.

Bruce Schneier elaborates on the different pros and cons of the two approaches too: http://www.schneier.com/crypto-gram-0111.html

Just to defend Kang, we haven't stated how to contact us if you have a
security bug. We've updated the text at the top of the forum link:

Seeing that Mr. Kang knew the attack surface beforehand, I don't see any problem with him disclosing the bug in the mailing list.

http://www.opsview.com/forums/opsview-community-edition/bug-reports

so you should email us about security bugs before publicly disclosing.

+1. I'd recommend putting an "I've found a security bug" in the documentation on how to contact you.

I have also updated our incident tracker item
(https://secure.opsera.com/jira/browse/OPS-1379) with the conditions of
the bug. As this only happens when someone is already logged into
Opsview AND they have ADMINACCESS, I think the exposure is not so bad
(compared with any public user being able to execute arbitrary code).

Personally: Seeing the report, at first I got a bit scared. Since no info was detailed in the patch, and the attack surface was unclear for me: we applied the patch inmediately. We don't actively use NMIS, so I really couldn't evaluate which logged in users could inject commands into the system (I was aware that the user had to log in, though), and since we hand out users to end users, it could be potentially dangerous.

Just for information, I've reported the bug back upstream to the NMIS
project ... on their mailing list. So I'm just as guilty as Kang :(
Point taken for next time.

Please accept my apologies if any of you have been offended. I fully defend your right of full disclosure, although it's not my personal preference, and hope you continue to fully disclose if that is your personal preference :)

Jose Luis Martinez
[email protected]
_______________________________________________
Opsview-users mailing list
[email protected]
http://lists.opsview.org/lists/listinfo/opsview-users

Reply via email to