Vulnerabilities / Threats

6/15/2009
05:00 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Twitter Security Heating Up In July

In an effort to raise awareness of browser security flaws, one researcher wants to post a vulnerability every day that shows the soft underside of the Fail Whale.

For Twitter users, the month of living dangerously begins in two weeks. Come July, Israeli security researcher Aviv Raff plans to publish a new Twitter security vulnerability every day, for the duration of the month.

Raff participated in the "Month of Browser Bugs" initiative in July 2006. It was an effort to raise awareness of browser security flaws. Now he wants to shine the spotlight on Twitter with the "Month of Twitter Bugs."

"Each day I will publish a new vulnerability in a third-party Twitter service on the twitpwn.com Web site," Raff explained on his blog. "As those vulnerabilities can be exploited to create a Twitter worm, I'm going to give the third-party service provider and Twitter at least 24 hours heads-up before I publish the vulnerability."

Raff says that while he has more than enough vulnerabilities to publish one every day in July, he nonetheless welcomes submissions.

Twitter did not respond to a request for comment.

Raff, in a previous blog post, observed that Twitter's most significant security problem is its API, which can be abused to create worms.

In May, he created proof-of-concept code that exploits a vulnerability in the Web site twitpic.com, which uses the Twitter API.

Twitter has weathered several security problems already this year. In April, a Twitter worm created by a 17-year-old infected at least 190 accounts and generated almost 10,000 spam tweets.

Also in April, a Twitter administrative account was hacked. The hacker who claimed responsibility posted screenshots of several celebrity Twitter accounts accessed through the compromised administrative account.

There have been other incidents too: In March, about 750 Twitter accounts were hacked and used to send spam. And in January, 33 Twitter accounts associated with celebrities were hacked through a brute-force password attack.

In response to the April account hack, Twitter co-founder Biz Stone said the company would conduct an independent security audit of its internal systems and would deploy additional anti-intrusion measures. To date, the company has not provided an update on its security efforts.


InformationWeek Analytics and DarkReading.com have published an independent analysis of security outsourcing. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
Why Enterprises Can't Ignore Third-Party IoT-Related Risks
Charlie Miller, Senior Vice President, The Santa Fe Group,  5/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11232
PUBLISHED: 2018-05-18
The etm_setup_aux function in drivers/hwtracing/coresight/coresight-etm-perf.c in the Linux kernel before 4.10.2 allows attackers to cause a denial of service (panic) because a parameter is incorrectly used as a local variable.
CVE-2017-15855
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, the camera application triggers "user-memory-access" issue as the Camera CPP module Linux driver directly accesses the application provided buffer, which resides in u...
CVE-2018-3567
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in WLAN while processing the HTT_T2H_MSG_TYPE_PEER_MAP or HTT_T2H_MSG_TYPE_PEER_UNMAP messages.
CVE-2018-3568
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, in __wlan_hdd_cfg80211_vendor_scan(), a buffer overwrite can potentially occur.
CVE-2018-5827
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in WLAN while processing an extscan hotlist event.