IBM knows. Believe they published a notice in the usual channel for all known and publicly available exploits.
Why is it game over if someone gets uid 0? Mainframe knowledge is a universe of its own; having 'cracked' one portion of code doesn't mean that the person can then successfully use that position to cause damage, without showing up on some daily/weekly report. Far more damage can be caused with just a regular userID (no SPECIAL/OPERATIONS), if the person knows the right areas to probe; and a lack of sufficient, specific RACF resource profiles will play into it. – Vignesh Mainframe Infrastructure -----Original Message----- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Porowski, Kenneth Sent: 16 January 2018 16:04 To: IBM-MAIN@LISTSERV.UA.EDU Subject: [EXTERNAL] Re: Fwd: Are Mainframes a Security Risk? | Enterprise Systems Media Or if he actually did on a properly secured system did he let IBM know? This would have been a SEV1 and fixed promptly. This email message and any accompanying materials may contain proprietary, privileged and confidential information of CIT Group Inc. or its subsidiaries or affiliates (collectively, “CIT”), and are intended solely for the recipient(s) named above. If you are not the intended recipient of this communication, any use, disclosure, printing, copying or distribution, or reliance on the contents, of this communication is strictly prohibited. CIT disclaims any liability for the review, retransmission, dissemination or other use of, or the taking of any action in reliance upon, this communication by persons other than the intended recipient(s). If you have received this communication in error, please reply to the sender advising of the error in transmission, and immediately delete and destroy the communication and any accompanying materials. To the extent permitted by applicable law, CIT and others may inspect, review, monitor, analyze, copy, record and retain any communications sent from or received at this email address. -----Original Message----- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Tom Marchant Sent: Tuesday, January 16, 2018 10:37 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: [IBM-MAIN] Fwd: Are Mainframes a Security Risk? | Enterprise Systems Media On Tue, 16 Jan 2018 10:00:57 -0500, Mark Regan wrote: >http://enterprisesystemsmedia.com/article/are-mainframes-a-security-ris >k "... he was able to find an exposure in z/OS rather fast, the ability of almost any user to edit the APF (authorized program facilities) and give yourself root access." ROFLMAO That someone examined a very poorly secured z/OS system proves nothing. -- Tom Marchant ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN MARKSANDSPENCER.COM ________________________________ Unless otherwise stated above: Marks and Spencer plc Registered Office: Waterside House 35 North Wharf Road London W2 1NW Registered No. 214436 in England and Wales. Telephone (020) 7935 4422 Facsimile (020) 7487 2670 www.marksandspencer.com Please note that electronic mail may be monitored. This e-mail is confidential. If you received it by mistake, please let us know and then delete it from your system; you should not copy, disclose, or distribute its contents to anyone nor act in reliance on this e-mail, as this is prohibited and may be unlawful. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN