Risk
9/16/2009
03:52 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Microsoft Gives Away Free Fuzzer, Secure Development Tool

More Security Development Lifecycle tools, ROI paper released

Microsoft continued efforts to spread its own secure software development program with today's release of a free fuzzer and tool for analyzing binary code.

The software giant last year began opening up its Security Development Lifecycle (SDL) for all third-party application developers and enterprises as a way to write cleaner, more secure code. As part of its SDL-sharing strategy, Microsoft has released several free tools for developers, including the SDL Threat Modeling Tool, the !exploitable (pronounced "bang exploitable") Crash Analyzer, an add-on to Microsoft's Windows debugger fuzzing tool; and the SDL Process Template, which integrates Microsoft's SDL directly into third-party and enterprise development environments.

Microsoft's latest tools -- BinScope Binary Analyzer and Mini-Fuzz File Fuzzer -- support the verification stage of the SDL process. "This is the testing phase," says David Ladd, principal security program manager for Microsoft's SDL team. Microsoft also released a white paper on how to manually integrate the SDL Process Template into its existing Visual Studio Team System development projects.

Along with iSEC Partners, the company also released a new report on how to measure the ROI of an SDL program. The report, which includes data from NIST studies and anecdotal data from iSEC, demonstrates how to use metrics to calculate an ROI: "The earlier you can find bugs, the cheaper it's going to be for development organizations," Ladd says.

BinScope Binary Analyzer is an in-house Microsoft tool that analyzes binary source code to ensure the code has flags set for detecting buffer overflows, data execution, and other potential vulnerabilities. The Mini-Fuzz File Fuzzer automatically runs various tests at the code to spot unexpected behaviors that could make it vulnerable.

"It looks for unplanned behavior...and analyzes if there are any security ramifications," he says. "This is our attempt to get more people exposed to fuzzing as a test procedure. Unfortunately, there are not a lot of folks using fuzzing, so we hope give people a low barrier-to-entry tool."

Security experts say Microsoft's open sharing of its SDL process and tools is a good thing. "It can't hurt. It's nice to see them sharing a little of what they have been bragging about for five years," says HD Moore, creator of Metasploit and director of security for BreakingPoint Systems.

"We strongly believe that taking advantage of our SDL tools will make a secure computing experience for everyone -- not just Microsoft [products]," Microsoft's Ladd says.

And Microsoft will continue to develop and roll out secure development tools in the future, he says. "There will always be more tools to come," he says. "Periodically, we will [look at] what we have available [in-house] and what does the threat environment look like? If there's a new threat, we may have to build new tools to address it." Meanwhile, in the new "Microsoft SDL: Return-on-Investment" guide, Microsoft and iSEC Partners include an example of how an organization would save $437,000 in one project, for an ROI of $350,000.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4403
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

CVE-2012-2930
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

CVE-2012-2932
Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

CVE-2012-5451
Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

CVE-2015-0297
Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.