RE: 0day: PDF pwns Windows

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



For the record, the original term "O-Day" was coined by a dyslexic
security engineer who listened to too much Harry Belafonte while working
all night on a drink of rum.  It's true.  Really.
 
t

> -----Original Message-----
> From: Roland Kuhn [mailto:rkuhn@xxxxxxxxxxxxxxxxxxxxxxxxx]
> Sent: Tuesday, September 25, 2007 10:58 AM
> To: Lamont Granquist
> Cc: Chad Perrin; Crispin Cowan; Casper.Dik@xxxxxxx; Gadi Evron; pdp
> (architect); bugtraq@xxxxxxxxxxxxxxxxx; full-
> disclosure@xxxxxxxxxxxxxxxxx
> Subject: Re: 0day: PDF pwns Windows
> 
> On 25 Sep 2007, at 00:57, Lamont Granquist wrote:
> 
> > The exploit is not made public by its use.  The exploit is not even
> > made public by (back-channel) sharing amongst the hacker/cracker
> > community. The exploit is only made public if detected or the
> > vulnerability is disclosed.  Until detected/disclosed the hacker/
> > cracker can use their 31337 0day spl01tz to break into whichever
> > vulnerable machines they like. 0day exploits are valuable because
the
> > opposition is ignorant of them.
> >
> > Posting exploits to BUGTRAQ, however, inherently makes them not
> > 0day...
> 
> And my ignorant self thought until this thread that the "0" in the
term
> referred to the number of days of head start granted to the vendor.
> Silly me. Because that would make all vulnerabilities published
without
> prior warning to the vendor a "0day"...
> 
> Roland (who seems to remember that this was once the meaning of this
> term)


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux