Risk

2/16/2010
05:42 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Proposal Would Hold Software Developers Accountable For Security Bugs

SANS releases Top 25 list of the most dangerous programming errors; joins with Mitre, others, to push for contract language that makes custom app developers liable for vulnerabilities

SANS' newly released Top 25 list of common programming flaws came with a little legal muscle, too, with representatives from SANs, Mitre, the U.S. Department of Homeland Security, the National Security Agency, and other organizations pushing for custom software developers to be held liable for insecure code they write.

Experts from more than 30 U.S. and international organizations, including OWASP, Microsoft, Apple, EMC, Oracle, McAfee, and Symantec, contributed to the CWE/SANS Top 25 list. And procurement experts from some of the organizations are recommending standard contract language for procurements that would ensure buyers aren't held liable for software that contains security flaws. "Wherever a commercial entity or government agency asks someone to write software for them, there is now a way they can begin to make the suppliers of that software accountable for [security] problems," says Alan Paller, director of research for the SANS Institute.

Paller says the contract language would be based in part on a draft in the works by the State of New York (PDF) that refers to the SANS Top 25 and would make the state's custom-software vendors contractually bound to provide apps that are free of those bugs. Paller says although there is "no formal agreement on the language" among the group at this point, it's focused on the section of New York's proposed contract language that reads: "the Vendor shall, at a minimum, conduct a threat assessment and analysis of vulnerability information, including the current list of SANS 25 Most Dangerous Programming Errors; provide the Purchaser with a written report as soon as possible after a vulnerability, threat, or risk has been identified."

He says some final tweaking of the language would ideally add a warranty for correcting secure-coding errors "at vendor expense."

Such a legal arrangement would not only protect customers of the software, Paller says, but also provide developers with a "safe harbor" of sorts. "What do I have to do to supply software that's safe enough so I don't get into legal problems with the customer?" he explains.

Joe Jarzombeck, director for software assurance for the national cybersecurity division at DHS, says any contract language would be voluntary. "There is no unified mandate," Jarzombeck says. And the Common Weaknesses Enumeration (CWE)/SANS Top 25 list is now being adopted by tool vendors as well, he notes.

"The [list is not to] say, 'Here's how to be 100 percent secure,' but to more definitive in the specific risks," he says.

For the buyer, making the vendor liable for security bugs would help protect its organization from potential breaches exploiting those flaws as well as prevent the vendor from charging them extra to fix them. And for developers, it's a "minimum standard of due care," SANS' Paller says.

But Gary McGraw, CTO of Cigital, whose company was involved with the project, says he predicts such an effort would yield "zero lawsuits" and would instead lead to more expensive software. "The liability angle is not the right idea," McGraw says. "The market is working right now. Sure, software is still busted. But companies are really making marked progress. As long as that's working, I don't see why you should invoke the liability hammer."

SANS' annual list had been criticized by security experts as more of a laundry list rather than offering a solution, but this year the list came with so-called "focus profiles" that broke the programming errors into groups based on categories of weaknesses and also provided mitigation information. The list is in order of priority this year, with failure to preserve Web page structure (think cross-site scripting) as No. 1, and race condition mistakes as No. 25, notes Robert Martin, lead for compatibility and outreach at Mitre.

The Top 25 encompasses programming mishaps that are the root cause of most major cyberattacks, including the breaches at Google, power companies, military systems, and attacks on small businesses and home users, its creators say.

Even with the upgrades to the Top 25, McGraw says it's ineffective: "It's still a popularity list and not based on actual bug data from any real company," he says. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-6705
PUBLISHED: 2018-12-12
Privilege escalation vulnerability in McAfee Agent (MA) for Linux 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to perform arbitrary command execution via specific conditions.
CVE-2018-15717
PUBLISHED: 2018-12-12
Open Dental before version 18.4 stores user passwords as base64 encoded MD5 hashes.
CVE-2018-15718
PUBLISHED: 2018-12-12
Open Dental before version 18.4 transmits the entire user database over the network when a remote unathenticated user accesses the command prompt. This allows the attacker to gain access to usernames, password hashes, privilege levels, and more.
CVE-2018-15719
PUBLISHED: 2018-12-12
Open Dental before version 18.4 installs a mysql database and uses the default credentials of "root" with a blank password. This allows anyone on the network with access to the server to access all database information.
CVE-2018-6704
PUBLISHED: 2018-12-12
Privilege escalation vulnerability in McAfee Agent (MA) for Linux 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to perform arbitrary command execution via specific conditions.