[VIM] Article suggestion: "wannabe security group members" doing harm to software developers (fwd)
security curmudgeon
jericho at attrition.org
Sun May 28 00:57:45 EDT 2006
---------- Forwarded message ----------
From: "[iso-8859-1] Marko Seppänen" <smarko at hoito.org>
To: security curmudgeon <jericho at attrition.org>
Cc: OSVDB Mods <moderators at osvdb.org>, Steven Christey <coley at mitre.org>
Date: Fri, 26 May 2006 16:29:53 +0300
Subject: [OSVDB Mods] Re: Article suggestion: "wannabe security group members"
doing harm to software developers
Hello,
I've posted following message to a few discussion boards in web. It should
answer to questions you had. And it's ok for you to post my original email to
VIM-list. You can also put the message below in full to there. I see that
Steven already posted a message about the dispute to the list.
- Marko
------------------------------------------------
I've now contacted security sites mentioning about this "flaw" and I'm glad
that some of them have already reacted and replied very quickly. For example,
[URL=http://www.osvdb.org/displayvuln.php?osvdb_id=25207]OSVDB[/URL] has now
marked the claimed flaw as "Myth/Fake". New analysis had been made.
I've been informed by many of them (as invidual persons, not as security
companies), that:
- there are significiant amount of diagnosis errors made by beginner
researchers:
[url]http://www.networksecurityarchive.org/html/Web-App-Sec/2005-12/msg00040.html[/url]
- these people are sometimes called as "ctrl-v kids", meaning the extent of his
testing is pasting certain characters into fields and making claims based on
the output
- it is even common, that mentioned kinds of incorrect/false security alerts
will find their way to multiple Vulnerability DataBases (VDB)
- there does exist many, who do not follow disclosure guidelines, don't care
who is impacted, don't try to find a workaround, and many of them can't even
figure out the name of the affected script
- there does exits many, who do follow disclosure guidelines, care who is
impacted and how, try to find a workaround, take contact to developers, etc.
I've also been informed, that this issue isn't easy to deal with from viewpoint
of management of VDB as they don't have time to indepently test and verify each
vulnerability post. This was told me by one VDB person, who wrote me a lenghty
email and who seems like a person, who really cares a great deal about accuracy
in the database content. And I believe him.
However, another one had took time to dig up disclaimers from security sites
mentioning expressions like these: "no warranties", "as is", "no pre-screening"
and "user uploading the information is the responsible one". With this I don't
mean to say that he was rude or something like that (he wasn't), but he
corroborated that it is not possible for them to pre-check every report they
get. From viewpoint of any software developer, I see that as a problem.
--
In my original message I mentioned certain nick names, when referring to "other
security experts". I'd like to add, that they have nothing to do with this
issue. They were just listed as links on claimer's blog's sidebar.
---------------------------------------------
More information about the VIM
mailing list