View Single Post
Old 10-23-2015, 09:43 AM   #172
knc1
Going Viral
knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.
 
knc1's Avatar
 
Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
Quote:
Originally Posted by charleski View Post
There are industry standards for responsible disclosure of security bugs. The time allowed for a patch varies from 45 days to 3 months or more. It is irresponsible and inaccurate to label these as 'threats', and this mechanism does work in stimulating a response to the defects discovered.
There are industry policies followed by established organizations, agreed.

But the context got lost (our comments on NoExpert's post).

A statement like:
"If not fixed by <deadline> then we will do <something>" is a threat.

I think that you will see that our rational in withholding publication while the vendor has time to evaluate the situation is exactly the same as the cert's description of their policy.
Both the first and second paragraphs of the page you linked to.

The only significant difference is the author has not published an exact time period.
The reasoning here is that a responsible vendor does not need to be pressured into correcting a potentially harmful software error.

If it needs fixing (in the vendor's opinion), then it will get fixed.
And just for the record, here is the last time our members found an exploitable error:
http://www.kb.cert.org/vuls/id/122656
https://web.nvd.nist.gov/view/vuln/d...=CVE-2012-4248
https://web.nvd.nist.gov/view/vuln/d...=CVE-2012-4249

If the vendor feels they need a specific amount of working time, then they will coordinate that with the author.
I can think of no reason that the author need publish any of those negotiations.

Also, keep in mind that Amazon/Lab126 actively follows the discussions on this site.
A thread that gathers an average of 1,000 views per day gets their attention.

Last edited by knc1; 10-23-2015 at 10:21 AM.
knc1 is offline   Reply With Quote