RE: 0day: PDF pwns Windows
For the record, the original term "O-Day" was coined by a dyslexic
security engineer who listened to too much Harry Belafonte while working
all night on a drink of rum. It's true. Really.
t
> -----Original Message-----
> From: Roland Kuhn [mailto:rkuhn@xxxxxxxxxxxxxxxxxxxxxxxxx]
> Sent: Tuesday, September 25, 2007 10:58 AM
> To: Lamont Granquist
> Cc: Chad Perrin; Crispin Cowan; Casper.Dik@xxxxxxx; Gadi Evron; pdp
> (architect); bugtraq@xxxxxxxxxxxxxxxxx; full-
> disclosure@xxxxxxxxxxxxxxxxx
> Subject: Re: 0day: PDF pwns Windows
>
> On 25 Sep 2007, at 00:57, Lamont Granquist wrote:
>
> > The exploit is not made public by its use. The exploit is not even
> > made public by (back-channel) sharing amongst the hacker/cracker
> > community. The exploit is only made public if detected or the
> > vulnerability is disclosed. Until detected/disclosed the hacker/
> > cracker can use their 31337 0day spl01tz to break into whichever
> > vulnerable machines they like. 0day exploits are valuable because
the
> > opposition is ignorant of them.
> >
> > Posting exploits to BUGTRAQ, however, inherently makes them not
> > 0day...
>
> And my ignorant self thought until this thread that the "0" in the
term
> referred to the number of days of head start granted to the vendor.
> Silly me. Because that would make all vulnerabilities published
without
> prior warning to the vendor a "0day"...
>
> Roland (who seems to remember that this was once the meaning of this
> term)