IBM knows.
Believe they published a notice in the usual channel for all known and publicly 
available exploits.

Why is it game over if someone gets uid 0?
Mainframe knowledge is a universe of its own; having 'cracked' one portion of 
code doesn't mean that the person can then successfully use that position to 
cause damage, without showing up on some daily/weekly report.

Far more damage can be caused with just a regular userID (no 
SPECIAL/OPERATIONS), if the person knows the right areas to probe; and a lack 
of sufficient, specific RACF resource profiles will play into it.

– Vignesh
Mainframe Infrastructure

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Porowski, Kenneth
Sent: 16 January 2018 16:04
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: [EXTERNAL] Re: Fwd: Are Mainframes a Security Risk? | Enterprise 
Systems Media

Or if he actually did on a properly secured system did he let IBM know?  This 
would have been a SEV1 and fixed promptly.



This email message and any accompanying materials may contain proprietary, 
privileged and confidential information of CIT Group Inc. or its subsidiaries 
or affiliates (collectively, “CIT”), and are intended solely for the 
recipient(s) named above.  If you are not the intended recipient of this 
communication, any use, disclosure, printing, copying or distribution, or 
reliance on the contents, of this communication is strictly prohibited.  CIT 
disclaims any liability for the review, retransmission, dissemination or other 
use of, or the taking of any action in reliance upon, this communication by 
persons other than the intended recipient(s).  If you have received this 
communication in error, please reply to the sender advising of the error in 
transmission, and immediately delete and destroy the communication and any 
accompanying materials.  To the extent permitted by applicable law, CIT and 
others may inspect, review, monitor, analyze, copy, record and retain any 
communications sent from or received at this email address.


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Tom Marchant
Sent: Tuesday, January 16, 2018 10:37 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: Re: [IBM-MAIN] Fwd: Are Mainframes a Security Risk? | Enterprise 
Systems Media

On Tue, 16 Jan 2018 10:00:57 -0500, Mark Regan  wrote:

>http://enterprisesystemsmedia.com/article/are-mainframes-a-security-ris
>k

"... he was able to find an exposure in z/OS rather fast, the ability of almost 
any user to edit the APF (authorized program
facilities) and give yourself root access."

ROFLMAO

That someone examined a very poorly secured z/OS system proves nothing.

--
Tom Marchant

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

MARKSANDSPENCER.COM
________________________________
 Unless otherwise stated above:
Marks and Spencer plc
Registered Office:
Waterside House
35 North Wharf Road
London
W2 1NW

Registered No. 214436 in England and Wales.

Telephone (020) 7935 4422
Facsimile (020) 7487 2670

www.marksandspencer.com

Please note that electronic mail may be monitored.

This e-mail is confidential. If you received it by mistake, please let us know 
and then delete it from your system; you should not copy, disclose, or 
distribute its contents to anyone nor act in reliance on this e-mail, as this 
is prohibited and may be unlawful.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to