Risk
7/29/2008
04:14 PM
Keith Ferrell
Keith Ferrell
Commentary
Connect Directly
RSS
E-Mail
50%
50%

IBM Midyear Security Report: A Bad Year That's Getting Worse

Time flies when you're having fun, and flies even faster when the bad guys are having their "fun." Already more than halfway through 2008 and a new security report let's us know in detail just how insecure a year it is.

Time flies when you're having fun, and flies even faster when the bad guys are having their "fun." Already more than halfway through 2008 and a new security report let's us know in detail just how insecure a year it is.The X-Force Mid-Year Trend Statistics Report from IBM Security Systems is out, and it makes for compellingly grim reading.

But not necessarily quick reading: the report's a honker that comes in at 85 pages (there's a download button on the report homepage link.)

Among the key bits:

Web sites and Web applications are the targets of choice today, with SQL injection attacks on the increase.

More than 3500 vulnerabilities were reported in the first six months of 2008; up 5 percent or so from last year.

Open source apps are increasingly being targeted.

Blog and social networking sites are homes to more and more malware.

Spam has gone back to bad old basics, mass mailing malicious urls rather than images; not sure if this is good news or not -- bad urls in spam worked before and evidently still do.

Every one of these threats and threat strategies affects small and midsize businesses same as they do bigbiz: small comfort in that, I know.

This is another of those good, detailed reports that may not tell you anything you don't already know (or suspect) but which presents its findings well, thoroughly and clearly. Worth reading, worth passing along -- and worth paying attention to.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.