[1]BADLOCK - Are 'Branded' Exploits Going Too Far?:
So there's been hype about this big exploit coming, for over a
month, before anything was released. It had a name, [2]a website and
a logo - and it was called Badlock.
And now it's out, and it's more like Sadlock - really a local
network DoS against DCE/RPC services on Windows and Linux with some
slight chance of pulling off a MiTM. No remote code exeuction, not
even privilege escalation.
...
Microsoft hasn't even labelled it as critical, merely important.
Crucial? As it was marketed, hardly.
...
There is a whole list of CVE's related, none of them are really
critical.
Another questionable point is that the person who 'discovered' these
bugs, is a member of Samba Core Team..and works on Samba.
So it's like hey, here's a bunch of vulnerabilities I found in my
own software, let's make a logo for them and give them a name (which
doesn't even really related to the vulns).
So yah there's nothing really wrong with branding a vulnerability,
to get awareness about something critical - get press coverage and
get people fixing it. But this? This is a minor bug, with no real
major production impact, only exploitable over a LAN which at words
allows for a MiTM.
...
A saw a great quote on Twitter..it went something like:
"All these names for exploits are getting confusing and can be hard
to remember/categorise - soon we'll need to invent some kinda system
that assigns numbers to vulnerabilities..."
LOL indeed.
Are these bugs important enough to patch? Oh yes, absolutely. Did
they need a month of marketing, a logo and a name to raise
awareness? Absolutely not. They could have slid into regular,
automated patch updates along with all other 'important' patches.
It could have been a interesting story about a whole series of bugs
in SAMBA, but it became a huge discussion about the Badlock
clownshow. Sad.
(Via [3]Darknet - The Darkside)
I can't agree with this article more. It's a great read. I didn't mean
to quote quite so much, but I get a hoot out of the story.
We spoke about this on [4]PVC Security podcast when the story first
broke. It looks like most if not all of our predictions came true.
__________________________________________________________________
My original entry is here: [5]BADLOCK - Are 'Branded' Exploits Going
Too Far? A: Yes!. It posted Fri, 15 Apr 2016 20:31:57 +0000.
Filed under: badlock, fud, full disclosure, InfoSec,
References
1.
http://feedproxy.google.com/~r/darknethackers/~3/LlwhHMgBg7M/
2.
http://badlock.org/
3.
http://feeds.feedburner.com/darknethackers
4.
https://www.pvcsec.com/
5.
https://www.prjorgensen.com/2016/04/15/badlock-are-branded-exploits-going-too-far-a-yes/