Gene,
All that an AC=1 module that is in an APF authorized module can do is to 
start running with the JSCBAUTH bit on if, and only if, it is invoked as a 
Job Step Task from the initiator, or other initiator-like process (z/OS 
UNIX Services, for instance).  However, a PCFLIH backdoor can allow a 
problem state, non-system key program that is not running APF authorized 
to receive control in an authorized state simply by causing a program 
interrupt to occur.  Now I don't know if this particular backdoor does 
this or not, but if it does (or worse, can be spoofed by a caller to do 
this) than it would constitute a violation of z/OS system integrity.

===============================================
Wayne Driscoll
OMEGAMON DB2 L3 Support/Development
wdrisco(AT)us.ibm.com
=============================================== 



From:
"Pate, Gene" <[email protected]>
To:
[email protected]
Date:
03/05/2012 08:30 AM
Subject:
Re: Program FLIH backdoor - This is a criminal breach of security!
Sent by:
IBM Mainframe Discussion List <[email protected]>



I am amazed at the uproar over this. Is there anything that a PCFLIH 
backdoor can accomplish that any AC=1 module in any APF authorized library 
cannot? 

<SNIP>

Gene Pate 
CSX Technology
Enterprise Architecture






----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to