Attacks/Breaches
10/5/2012
12:34 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Weaponized Bugs: Time For Digital Arms Control

Thriving trade in zero-day vulnerabilities means dangerous bugs get sold to the highest bidder, and that puts everyone else at risk.

Who Is Anonymous: 10 Key Facts
Who Is Anonymous: 10 Key Facts
(click image for larger view and for slideshow)
Is it right that every newly discovered zero-day vulnerability can potentially be turned into a weapon?

Of course, not every bug goes down that path. Security researchers can disclose unknown vulnerabilities directly to vendors, then withhold details until the vendor issues a fix. They can also simply go public with information about the vulnerability. Or they can keep the details of the bug secret, and sell the information to the highest bidder. But if they do that, who's buying?

"Google and Microsoft can't outbid the U.S. government--they will never win a bidding war with the Army, Navy, or NSA," warned security and privacy expert Christopher Soghoian in his recent keynote speech at the Virus Bulletin 2012 conference in Dallas, titled, "The trade in security exploits: free speech or weapons in need of regulation?"

Recently, there's been a recent shift away from the old way of selling bugs, via "bug bounties and compensated responsible disclosure through firms like ZDI and TippingPoint," said Soghoian, principal technologist and a senior policy analyst with the Speech, Privacy and Technology Project at the American Civil Liberties Union. Instead, valuable bugs are now being resold by firms such as Endgame Systems and Vupen, who make no bones about the possibility that vulnerabilities might be used for espionage or even offensive operations.

[ Read So You Want To Be A Zero Day Exploit Millionaire? ]

What's a good bug worth? Earlier this year, Forbes profiled The Grugq, who's based in Bangkok and acts as a broker between vulnerability buyers and sellers. The Grugq, who takes a 15% commission, says he generally won't touch a bug unless it's worth at least $50,000, and six-figure deals aren't uncommon.

Security expert Charlie Miller, a former National Security Agency employee, said that he sold a Linux operating system Samba server software vulnerability in 2005 to the U.S. government for $80,000, after he was told to name a price. Although Miller now says he wished he'd asked for more money, he did admit to getting a fabulous new kitchen out of the deal.

That revelation, cited by Soghoian as the first publicly known sale of a vulnerability to the U.S. government, led to somewhat predictable banter, with The Grugq proposing via Twitter that henceforth, "[vulnerabilities] should be rated based on the number of kitchen remodeling projects they could sponsor," offering a baseline of "3 kitchens" for any malware signed with the digital certificates recently stolen from Adobe.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2008-3277
Published: 2014-04-15
Untrusted search path vulnerability in a certain Red Hat build script for the ibmssh executable in ibutils packages before ibutils-1.5.7-2.el6 in Red Hat Enterprise Linux (RHEL) 6 and ibutils-1.2-11.2.el5 in Red Hat Enterprise Linux (RHEL) 5 allows local users to gain privileges via a Trojan Horse p...

CVE-2010-2236
Published: 2014-04-15
The monitoring probe display in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 4.0.0 through 4.2.0 and 5.1.0 through 5.3.0, and Proxy 5.3.0, allows remote authenticated users with permissions to administer monitoring probes to execute arbitrary code via unspecified vectors, rela...

CVE-2011-3628
Published: 2014-04-15
Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.0...

CVE-2012-0214
Published: 2014-04-15
The pkgAcqMetaClearSig::Failed method in apt-pkg/acquire-item.cc in Advanced Package Tool (APT) 0.8.11 through 0.8.15.10 and 0.8.16 before 0.8.16~exp13, when updating from repositories that use InRelease files, allows man-in-the-middle attackers to install arbitrary packages by preventing a user fro...

CVE-2013-4768
Published: 2014-04-15
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).

Best of the Web