Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.64.1002181148000.1263@faron.mitre.org>
Date: Thu, 18 Feb 2010 11:53:30 -0500 (EST)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: kernel information leak via userspace
 USB interface


On Thu, 18 Feb 2010, Marcus Meissner wrote:

> Are we considering "giving desktop local users unintended rights"
> a security issue or not?

from a CVE purist perspective, if the security model is that "users with 
physical access should not be able to read portions of kernel memory" then 
a violation of that is technically a vulnerability, even if the attack 
complexity is high - assuming that there isn't already some easier way 
that the attacker can get the same results through legitimate means. 
Being able to crash the system by plugging in a USB device (for example) 
is about as easy as the defenestration exploit - i.e. throwing the 
computer out the window - so in that case I wouldn't view it as a 
vulnerability.  If someone with physical access can read the kernel memory 
that's being leaked, if don't already own the box, that seems a little 
more like a vulnerability to me.

- Steve

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.