Vulnerabilities / Threats
8/4/2010
07:55 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Researchers Throw Down Vulnerability-Disclosure Gauntlet

TippingPoint's Zero Day Initiative (ZDI) program institutes deadline of six months for vendors to fix bugs -- or else the bugs get published

First it was Google drawing a line in the sand with a 60-day deadline for vendors to fix vulnerabilities it finds in their products before going public. Now it's TippingPoint's Zero Day Initiative (ZDI), which officially announced today it has set a six-month time frame from when it reports a bug to a vendor until it goes public with it.

ZDI, which historically has worked with vendors in not disclosing any bugs it finds until they patch them, says some vendors are getting a little too comfortable with that open-ended agreement. ZDI has 31 high-risk vulnerabilities on its docket that have been awaiting patches for more than a year: "We have some bulletins that are 3 years old," says Aaron Portnoy, manager of security researcher for ZDI. "The longer we sit on these, the longer people are exposed to [the threats]. Letting vendors take as much time as they needed, they took more time than they needed ... and there were no repercussions for them, but more work for us."

Aside from Google and now ZDI, Rapid7 also recently set a deadline for bug disclosures of 15 days: If a vendor hasn't patched it by then, Rapid7 reports the bug to CERT, which gives vendors 45 days to patch from the initial report date before it goes public.

But Microsoft has stood firm in its refusal to place a timetable on when it issues patches for reported bugs. Mike Reavey, director of Microsoft Security Response Center, contends that patch deadlines aren't the answer because it's not a "one-size-fits-all" time frame for fixing vulnerabilities -- some just take longer to fix than others. It's a delicate balance between quality and timeliness given that Microsoft puts the patches through a hefty testing process before issuing them, he says.

ZDI's new policy applies to currently outstanding vulnerabilities it has reported to vendors, as well as any it finds from now on. If the vendor doesn't patch by the six-month mark, then ZDI will publish a "limited" advisory that includes mitigation options for users. But ZDI says it will allow vendors to ask for extensions for difficult patches. "If any vulnerability is given an extension we plan on publishing the communication we've had with the vendor regarding the issue once it is patched," Portnoy blogged today.

Google called it irresponsible for vendors to leave a flaw unfixed for a long period of time -- this can drag on for years sometimes, Google researchers say. So from now on, any serious bug they report must be fixed within the 60-day deadline; if the vendor doesn't fix it within that time frame, Google will publish an analysis of the bug as well as any workarounds.

HD Moore, chief security officer at Rapid7 and chief architect of Metasploit, says you can tell within 60 days whether a vendor is going to prioritize a fix, anyway. "ZDI got fed up ... For them, it was a big drain to manage and keep track of them all," Moore says.

A big trend in vulnerability discovery of late is that, increasingly, different researchers are coincidentally finding the same bugs, some within weeks of one another, so the lines are blurring, researchers say.

What about the risk of bad guys getting hold of the unpatched bug once it's published? ZDI, Google, and Rapid7 researchers contend that holding off on fixing a bug is riskier, especially since many newly discovered bugs have already been found by other researchers. A deadline for vendors is an attempt to close the gap between discovery and patching, they say.

"I hope more companies will do this ... with a fixed disclosure schedule," Moore says. "Then vendors have to take it seriously to go out and fix it."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: nice post
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1750
Published: 2015-07-01
Open redirect vulnerability in nokia-mapsplaces.php in the Nokia Maps & Places plugin 1.6.6 for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the href parameter to page/place.html. NOTE: this was originally reported as cross-sit...

CVE-2014-1836
Published: 2015-07-01
Absolute path traversal vulnerability in htdocs/libraries/image-editor/image-edit.php in ImpressCMS before 1.3.6 allows remote attackers to delete arbitrary files via a full pathname in the image_path parameter in a cancel action.

CVE-2015-0848
Published: 2015-07-01
Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.

CVE-2015-1330
Published: 2015-07-01
unattended-upgrades before 0.86.1 does not properly authenticate packages when the (1) force-confold or (2) force-confnew dpkg options are enabled in the DPkg::Options::* apt configuration, which allows remote man-in-the-middle attackers to upload and execute arbitrary packages via unspecified vecto...

CVE-2015-1950
Published: 2015-07-01
IBM PowerVC Standard Edition 1.2.2.1 through 1.2.2.2 does not require authentication for access to the Python interpreter with nova credentials, which allows KVM guest OS users to discover certain PowerVC credentials and bypass intended access restrictions via unspecified Python code.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report