Joanna Rutkowska said: >> Dear all, this is not a 0day, it is a public release of a responsibly >> disclosed vulnerability. >> > >Yes, indeed it *seems* so: >http://www.microsoft.com/technet/security/Bulletin/MS07-031.mspx The kinds of discrepancies you list are an almost daily occurrence with many vendors. I can't begin to imagine how many sysadmins and even security researchers make assumptions that link two separate issues just because they happen to involve the same component. Some sufficient correlators are: - cross-references (CVE, Bugtraq ID, Secunia, OSVDB, etc.) - claims by reliable parties (for some definition of "reliable") that the vendor's advisory fixes issue X - sufficient details in both vendor and researcher advisory WITH ATTACK VECTORS ("buffer overflow in component X doesn't cut it") - mutual credits and date-of-disclosure coordination - private verification by vendor Any one of these is usually enough. Doing this correlation is one of the significant value-adds of refined vulnerability information providers, by the way. >The time line is also interesting, BTW: Disclosure timelines are some of the most entertaining and educational reading in security advisories. There's now (finally) enough data for somebody somewhere to do a quantitative study on reported timelines, including typical vendor response times, and issues in the process. (If someone wants to pursue this, feel free to contact me to bat ideas around.) A lot of researcher timelines show a delay between the original discovery and vendor notification. In some cases, this can be due to additional time required to prove that the discovery is exploitable in order to give a more reliable report to the vendor, but that's not always the case. - Steve