From: Jarrod Frates (jfrates.ml@gmail.com)
Date: Wed Apr 09 2008 - 13:40:56 EDT
On Tue, Apr 8, 2008 at 8:04 PM, <Yousif@vapt-sec.com> wrote:
> The information about the insecurity isn't illegal as I did not use valid information from any .RDP connection file.
While it technically may not have been illegal, it was almost
certainly an ethical breach. If this is a real exploit (and I am
withholding judgment at this point as I have not tested the reported
circumstances), disclosing it in public without the explicit approval
of your client is unethical, and may even be a breach of contract. On
top of that, publicizing an exploit without notifying the vendor is
irresponsible disclosure, another ethical lapse.
What is unclear here is whether the cmd.exe was disabled or merely
hidden, and even if it was disabled whether batch processing was
disabled, which could account for this.
-- Jarrod Frates, GAWN ------------------------------------------------------------------------ This list is sponsored by: Cenzic Need to secure your web apps NOW? Cenzic finds more, "real" vulnerabilities fast. Click to try it, buy it or download a solution FREE today! http://www.cenzic.com/downloads ------------------------------------------------------------------------ -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean.
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:30 EDT