Attacks/Breaches
10/5/2012
12:34 PM
50%
50%

Weaponized Bugs: Time For Digital Arms Control

Thriving trade in zero-day vulnerabilities means dangerous bugs get sold to the highest bidder, and that puts everyone else at risk.

Who Is Anonymous: 10 Key Facts
Who Is Anonymous: 10 Key Facts
(click image for larger view and for slideshow)
Is it right that every newly discovered zero-day vulnerability can potentially be turned into a weapon?

Of course, not every bug goes down that path. Security researchers can disclose unknown vulnerabilities directly to vendors, then withhold details until the vendor issues a fix. They can also simply go public with information about the vulnerability. Or they can keep the details of the bug secret, and sell the information to the highest bidder. But if they do that, who's buying?

"Google and Microsoft can't outbid the U.S. government--they will never win a bidding war with the Army, Navy, or NSA," warned security and privacy expert Christopher Soghoian in his recent keynote speech at the Virus Bulletin 2012 conference in Dallas, titled, "The trade in security exploits: free speech or weapons in need of regulation?"

Recently, there's been a recent shift away from the old way of selling bugs, via "bug bounties and compensated responsible disclosure through firms like ZDI and TippingPoint," said Soghoian, principal technologist and a senior policy analyst with the Speech, Privacy and Technology Project at the American Civil Liberties Union. Instead, valuable bugs are now being resold by firms such as Endgame Systems and Vupen, who make no bones about the possibility that vulnerabilities might be used for espionage or even offensive operations.

[ Read So You Want To Be A Zero Day Exploit Millionaire? ]

What's a good bug worth? Earlier this year, Forbes profiled The Grugq, who's based in Bangkok and acts as a broker between vulnerability buyers and sellers. The Grugq, who takes a 15% commission, says he generally won't touch a bug unless it's worth at least $50,000, and six-figure deals aren't uncommon.

Security expert Charlie Miller, a former National Security Agency employee, said that he sold a Linux operating system Samba server software vulnerability in 2005 to the U.S. government for $80,000, after he was told to name a price. Although Miller now says he wished he'd asked for more money, he did admit to getting a fabulous new kitchen out of the deal.

That revelation, cited by Soghoian as the first publicly known sale of a vulnerability to the U.S. government, led to somewhat predictable banter, with The Grugq proposing via Twitter that henceforth, "[vulnerabilities] should be rated based on the number of kitchen remodeling projects they could sponsor," offering a baseline of "3 kitchens" for any malware signed with the digital certificates recently stolen from Adobe.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-1793
Published: 2014-12-25
rendering/svg/RenderSVGResourceFilter.cpp in WebCore in WebKit in Google Chrome before 11.0.696.65 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted SVG document that leads to a "stale pointer."

CVE-2011-1794
Published: 2014-12-25
Integer overflow in the FilterEffect::copyImageBytes function in platform/graphics/filters/FilterEffect.cpp in the SVG filter implementation in WebCore in WebKit in Google Chrome before 11.0.696.65 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified ...

CVE-2011-1795
Published: 2014-12-25
Integer underflow in the HTMLFormElement::removeFormElement function in html/HTMLFormElement.cpp in WebCore in WebKit in Google Chrome before 11.0.696.65 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted HTML document con...

CVE-2011-1796
Published: 2014-12-25
Use-after-free vulnerability in the FrameView::calculateScrollbarModesForLayout function in page/FrameView.cpp in WebCore in WebKit in Google Chrome before 11.0.696.65 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaS...

CVE-2011-1798
Published: 2014-12-25
rendering/svg/RenderSVGText.cpp in WebCore in WebKit in Google Chrome before 11.0.696.65 does not properly perform a cast of an unspecified variable during an attempt to handle a block child, which allows remote attackers to cause a denial of service (application crash) or possibly have unknown othe...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.