Thanks, David, Joe, and Michael.

I downloaded and read the white paper, and feel much more secure.

Dwayne

---- Original message ----
>Date: Wed, 2 Jan 2008 12:44:58 -0800
>From: "Easter, David" <[EMAIL PROTECTED]>  
>Subject: Re: Remedy and SQL injection attacks  
>To: [email protected]
>
>The URL for the white paper, btw, is:
>
>http://www.bmc.com/supportu/documents/40/63/84063/84063.pdf
>
>-David J. Easter
>Sr. Product Manager, Service Management Business Unit
>BMC Software, Inc.
> 
>The opinions, statements, and/or suggested courses of action expressed
>in this E-mail do not necessarily reflect those of BMC Software, Inc.
>My voluntary participation in this forum is not intended to convey a
>role as a spokesperson, liaison or public relations representative for
>BMC Software, Inc.
>
>-----Original Message-----
>From: Action Request System discussion list(ARSList)
>[mailto:[EMAIL PROTECTED] On Behalf Of Durrant, Michael M. - ITSD
>Sent: Wednesday, January 02, 2008 12:21 PM
>To: [email protected]
>Subject: Re: Remedy and SQL injection attacks
>
>Remedy automatically "escapes" commands going to the database so SQL
>injection is a moot point.  BMC has an excellent white paper entitled
>"Security Attacks and AR System" that covers SQL injection, buffer
>overruns, privilege elevation, etc.
>
>-----Original Message-----
>From: Action Request System discussion list(ARSList)
>[mailto:[EMAIL PROTECTED] On Behalf Of Dwayne Martin
>Sent: Wednesday, January 02, 2008 12:48 PM
>To: [email protected]
>Subject: Remedy and SQL injection attacks
>
>Hello Everyone,
>
>Here is an issue I have just become aware of, and am wondering how
>Remedy handles the danger, or if it even is a danger.
>
>It seems that if a web page accepts data input, and uses that data to
>query a database, the user can insert a value like:
>
>"whatever;do something nasty;--".  
>
>Then if the web page uses this value to query the database, the database
>will actually perform the "do something nasty" command, which could be
>anything from dropping a table to giving somebody administrator
>permissions.
>
>(For a neat little cartoon illustrating this danger see:
>http://xkcd.com/327/.)
>
>So my question is, Does this apply to Remedy data input or queries?
>Suppose somebody queries a Remedy form for entries where a particular
>field = "whatever;do something nasty;--".  Or they enter their name as
>"whatever;do something nasty;--"?  Will the database do something nasty,
>or does Remedy take precautions against it, or is there no danger in the
>first place?
>
>Dwayne Martin
>James Madison University
>
>________________________________________________________________________
>_______
>UNSUBSCRIBE or access ARSlist Archives at www.arslist.org Platinum
>Sponsor: www.rmsportal.com ARSlist: "Where the Answers Are"
>The information contained in this email may be privileged, confidential
>or otherwise protected from disclosure.  All persons are advised that
>they may face penalties under state and federal law for sharing this
>information with unauthorized individuals.  If you received this email
>in error, please reply to the sender that you have received this
>information in error.  Also, please delete this email after replying to
>the sender.
>
>________________________________________________________________________
>_______
>UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
>Platinum Sponsor: www.rmsportal.com ARSlist: "Where the Answers Are"
>
>_______________________________________________________________________________
>UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
>Platinum Sponsor: www.rmsportal.com ARSlist: "Where the Answers Are"

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
Platinum Sponsor: www.rmsportal.com ARSlist: "Where the Answers Are"

Reply via email to