Risk
7/1/2008
09:33 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Hey You. Yeah, You: Patch Your Web Browser

Roughly 59% of Internet users use the latest, more secure Web browsers, according to an examination of what version Web browser, down to the patch level, people are using. That means about 576 million Web surfers leave themselves vulnerable to attack. You might just (not) be surprised by who doesn't patch.

Roughly 59% of Internet users use the latest, more secure Web browsers, according to an examination of what version Web browser, down to the patch level, people are using. That means about 576 million Web surfers leave themselves vulnerable to attack. You might just (not) be surprised by who doesn't patch.The study, published today, was conducted by the Swiss Federal Institute of Technology, Google, and IBM Internet Security Systems. The researchers found that no matter how quickly browser and plug-in vendors create patches to fill security holes, it could be months before a large segment of the Internet population will apply those patches.

While I wasn't surprised to see 83.3% of Firefox users having applied the most recent patches, the same can't be said for Opera users, because only 56.1% of those users keep their browser up to date. One would think that both Firefox and Opera users would be more technically savvy than the average user, thereby more prone to patch. Unlike Internet Explorer users, where less than half, at 47.6%, bother to apply the most recent software updates.

The study examined search and Web application log data from Google to ascertain what version of browsers, including patch levels, are used. For Internet Explorer, the researchers culled data from Danish security firm Secunia's Personal Software Inspector.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-1793
Published: 2014-12-25
rendering/svg/RenderSVGResourceFilter.cpp in WebCore in WebKit in Google Chrome before 11.0.696.65 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted SVG document that leads to a "stale pointer."

CVE-2011-1794
Published: 2014-12-25
Integer overflow in the FilterEffect::copyImageBytes function in platform/graphics/filters/FilterEffect.cpp in the SVG filter implementation in WebCore in WebKit in Google Chrome before 11.0.696.65 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified ...

CVE-2011-1795
Published: 2014-12-25
Integer underflow in the HTMLFormElement::removeFormElement function in html/HTMLFormElement.cpp in WebCore in WebKit in Google Chrome before 11.0.696.65 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted HTML document con...

CVE-2011-1796
Published: 2014-12-25
Use-after-free vulnerability in the FrameView::calculateScrollbarModesForLayout function in page/FrameView.cpp in WebCore in WebKit in Google Chrome before 11.0.696.65 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaS...

CVE-2011-1798
Published: 2014-12-25
rendering/svg/RenderSVGText.cpp in WebCore in WebKit in Google Chrome before 11.0.696.65 does not properly perform a cast of an unspecified variable during an attempt to handle a block child, which allows remote attackers to cause a denial of service (application crash) or possibly have unknown othe...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.