<<< Date Index >>>     <<< Thread Index >>>

Re: Re: 0day: PDF pwns Windows




I was under the impression that "0day" came from the hacking/cracking community and was synonymous with the concept of "private 0day" that has been used in this thread.

So, a hacker/cracker would have a variety of tools at their disposal including many exploits that were known to security professionals, vendors, and the public for various lengths of time, but also the "0day" exploits for which no vulnerable machines should be patched against. As soon as the vulnerability is published, it no longer becomes a "0day" since even in the absence of vendor patches, admins could take actions to audit and protect their systems.

Under this definition, "0day" exploits should be not publically disclosed and to be pedantic should be actively being used to break into systems. Exploits generated by the grey-hat community, not used for malicious reasons, and published before vendor patches exist would not have gone through the "0day" stage. Neither would exploits generated for publically known vulnerabilities before the vendor patches were released would be considered "0day" since the vulnerability was publically known and again there could be workarounds encountered by the hacker/cracker that would prevent gaining access.

It seems that the definition of the term has morphed in the past 10+ years though...

On Sat, 22 Sep 2007 johanfunsale@xxxxxxxxx wrote:
I think we're missing the point. To my very limited knowledge, a zero day vulnerability is a vulnerability that is released into the wild before the vendor has notified its customers thereof, i.e. the person who discovered the vulnerability decides to release it to parties other than the vendor in question.

This will most likely lead to a zero day exploit, which is an exploit that "exploits" the vulnerability before the vendor releases a patch for that vulnerability.

This is just my view, but if it makes sense, use it as your own.

Regards,
Johan