[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Re: 0day: PDF pwns Windows



I was under the impression that "0day" came from the hacking/cracking 
community and was synonymous with the concept of "private 0day" that has 
been used in this thread.
So, a hacker/cracker would have a variety of tools at their disposal 
including many exploits that were known to security professionals, 
vendors, and the public for various lengths of time, but also the "0day" 
exploits for which no vulnerable machines should be patched against.  As 
soon as the vulnerability is published, it no longer becomes a "0day" 
since even in the absence of vendor patches, admins could take actions to 
audit and protect their systems.
Under this definition, "0day" exploits should be not publically disclosed 
and to be pedantic should be actively being used to break into systems. 
Exploits generated by the grey-hat community, not used for malicious 
reasons, and published before vendor patches exist would not have gone 
through the "0day" stage.  Neither would exploits generated for publically 
known vulnerabilities before the vendor patches were released would be 
considered "0day" since the vulnerability was publically known and again 
there could be workarounds encountered by the hacker/cracker that would 
prevent gaining access.
It seems that the definition of the term has morphed in the past 10+ years 
though...
On Sat, 22 Sep 2007 johanfunsale@xxxxxxxxx wrote:
I think we're missing the point. To my very limited knowledge, a zero day vulnerability is a vulnerability that is released into the wild before the vendor has notified its customers thereof, i.e. the person who discovered the vulnerability decides to release it to parties other than the vendor in question.
This will most likely lead to a zero day exploit, which is an exploit 
that "exploits" the vulnerability before the vendor releases a patch for 
that vulnerability.
This is just my view, but if it makes sense, use it as your own.

Regards,
Johan