tuytumadre@xxxxxxx wrote:
I do not meen to flame you, but you are an irresponsible disgrace to the hacking community. Do you not care about the customer? You never publicly disclose details to a vulnerability of this magnitude. This is an image vulnerability, for crying out loud.Sure you do. You disclose the details of the vulnerability when the vendor has a proven history of non-responsiveness, and the damage that the vendor is able to do by stalling the release is most likely greater than the damage that will result from disclosure of several non-critical flaws. AFAICT, IE 6.0 SV1 merely crashes when faced with these issues. According to Microsoft, it's not a vulnerability at all unless there's an attack vector enabling code execution.
What's the first thing they tell you to do when most vulnerability details are released? Disable active scripting. That doesn't work here. What are the innocent, ignorant computer users going to do? Disable images? I think not. You should be ashamed.The point you miss, is that thanks to Mr. Zalewski's decision to publish the details of this vulnerability ensures that AV/IDS signatures exist for the portion of users who care to update them. Meanwhile, I can afford to wait the six, twelve, eighteen, or twenty four months that Redmond takes to patch IE issues. Or, maybe it will be a refreshingly reduced timeline, only a month or two, since this is a supposedly critical issue.
I firmly believe that you are decieving us when you say you had a hard time with secure@xxxxxxxxxxxxx <mailto:secure@xxxxxxxxxxxxx>; in fact, I don't even think that you have ever once in your life reported a vulnerability to them responsibly. Otherwise, you would not have such harsh feelings about them. If the evil of the stereotypical Microsoft machine exists anywhere on the campus in Redmond, it will not be found in the building of MSRC, which is where your secure@xxxxxxxxxxxxx <mailto:secure@xxxxxxxxxxxxx> emails are directed....and I firmly believe that you have never had the experience of attempting to triage a vulnerability that was anything less than critical through Microsoft. If you have, as I have, you'll understand, as I do, that it's possibly the closest thing to hell you'll go through in your research work. The "evil of the stereotypical Microsoft machine" isn't as much an evil as an ineptitude. Microsoft's current processes have huge problems with efficiency, quality, and effectiveness that have few parallels in the industry, and it isn't for lack of resources. And aside from that, they require the researcher to provide a full, complete assessment of impact. That's not feasible for a great number of us, who are, after all, nothing more than volunteers.
Come on man. I know you have talent. You are a good researcher of computer security. But if your talent is going to be wasted like this, you are nothing more to us than a script kiddie.Sorry, but you have about as much claim to speak for "us" as this e-mail speaks for you. Now, at least my AV/IPS systems can attempt to block this attack. Sure beats sitting waiting, uninformed, while Redmond deliberates over its delivery mechanism and release schedule. Also, vulnerability information such as this has helped me make another important decision: to quit using IE altogether. Until Internet Explorer's code undergoes a significant paradigm shift from a system component back to its proper place in network design as a user application, and until Microsoft's security processes undergo significant reform in the areas of quality, rapid response, and researcher-developer collaboration, issues like this will keep coming up.
Regards, Matthew Murphy
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/