Re: Code vulnerability

2018-12-10 Thread Seymour J Metz
http://mason.gmu.edu/~smetz3 From: IBM Mainframe Discussion List on behalf of Rugen, Len Sent: Saturday, December 8, 2018 1:18 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Code vulnerability I guess you could write assembler code entirely with DC

Re: Code vulnerability

2018-12-08 Thread zMan
That's actually not crazy, and matches what Tripwire and friends do IIRC. As opposed to a long-ago QA person who would compare each file from each release and demand explanations for each new or changed file. Since this was VM and the products included source code, the conversation would go like t

Re: Code vulnerability

2018-12-08 Thread Jeremy Nicoll
On Sat, 8 Dec 2018, at 19:28, Paul Gilmartin wrote: > "ZAP" is a key word. How does one guarantee that any program in any language > hasn't been ZAPped after passing audit? Twenty years or so ago the bank I worked at ran an audit tool which stored a hash or checksum of every loadmodule, and each

Re: Code vulnerability

2018-12-08 Thread Walt Farrell
On Sat, 8 Dec 2018 21:09:42 +0200, Binyamin Dissen wrote: >I don't believe this tool would be appropriate for the OP as it detects system >objects (for the lack of a better term) that allow inappropriate privilege >elevation or storage access. Application code would not benefit from this >tool.

Re: Code vulnerability

2018-12-08 Thread Paul Gilmartin
On Sat, 8 Dec 2018 18:18:04 +, Rugen, Len wrote: >I guess you could write assembler code entirely with > DCX'.' > Don't do that! RLDs? Location independent code? >The use ZAP to maintain it :-) > "ZAP" is a key word. How does one guarantee that any program in any langua

Re: Code vulnerability

2018-12-08 Thread Binyamin Dissen
ember 7, 2018 4:39 PM :>To: IBM-MAIN@LISTSERV.UA.EDU :>Subject: Re: Code vulnerability :> :>I currently work for Micro Focus, and we have the "Fortify" product line. I am NOT in that group, however, and I really don't know if it does what you are looking for or no

Re: Code vulnerability

2018-12-08 Thread Rugen, Len
I guess you could write assembler code entirely with DCX'.' The use ZAP to maintain it :-) -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the mes

Re: Code vulnerability

2018-12-08 Thread Steve Beaver
-MAIN@LISTSERV.UA.EDU Subject: Re: Code vulnerability I currently work for Micro Focus, and we have the "Fortify" product line. I am NOT in that group, however, and I really don't know if it does what you are looking for or not - although I know it does have support for scanning main

Re: Code vulnerability

2018-12-08 Thread Timothy Sipples
As another candidate, AppScan Source supports COBOL, but I'm not sure about Assembler. That's quite technically tricky. Timothy Sipples IT Architect Executive, Industry Solutions, IBM Z & Linux

Re: Code vulnerability

2018-12-07 Thread x ksi
--- > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On > Behalf Of Steve Smith > Sent: Friday, December 07, 2018 2:14 PM > To: IBM-MAIN@LISTSERV.UA.EDU > Subject: Re: Code vulnerability > > Depends on what kind of vulnerability you're looking fo

Re: Code vulnerability

2018-12-07 Thread Richard Way
7;t know about HLASM. Something you may want to explore, if you haven't already investigated it. Rich Way -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Steve Smith Sent: Friday, December 07, 2018 2:14 PM To: IBM-MAIN@LISTSERV

Re: Code vulnerability

2018-12-07 Thread Steve Smith
Depends on what kind of vulnerability you're looking for. z/OS itself isn't the only valuable thing you have. sas On Fri, Dec 7, 2018 at 2:11 PM Charles Mills wrote: > Ray Overby at Key Resources, Inc. > > Charles > > > -Original Message- > From: IBM Mainframe Discussion List [mailto:I

Re: Code vulnerability

2018-12-07 Thread Charles Mills
Ray Overby at Key Resources, Inc. Charles -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of scott Ford Sent: Friday, December 7, 2018 10:04 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Code vulnerability All, We write in Enterprise Cobol

Re: Code vulnerability

2018-12-07 Thread Lou Losee
Scott, Unless your code runs authorized, is an SVC or a PC I don't think it can cause vulnerabilities that threaten your system. The system does a pretty good job of isolating problem state code such that it will not cause problems. Lou -- Artificial Intelligence is no match for Natural Stupidity

Re: Code vulnerability

2018-12-07 Thread Edgington, Jerry
IBM has a tool called ADDI and I believe Compuware might have one as well. -Original Message- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of scott Ford Sent: Friday, December 07, 2018 1:04 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Code vulnerability Al