Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

IBM Software Vulnerabilities Spiked In 2013

Most code flaws still involve non-Microsoft products, and overall patching speed has improved, study presented at RSA conference finds.

Did the number of vulnerabilities reported in IBM products jump by 400% from 2012 to 2013?

That finding comes from a new study, released Wednesday by vulnerability management security firm Secunia at the RSA conference, of the top types of software vulnerabilities facing enterprise networks. That information is crucial for helping IT administrators prioritize which applications and operating systems to patch first.

Overall, Secunia received reports on 13,073 new vulnerabilities in software products in 2013 -- comprising 2,289 products from 539 different vendors -- and said 16.3% of the bugs were rated "highly critical," meaning they can be used to remotely exploit systems. Finally, 0.4% of the vulnerabilities rated as "extremely critical," meaning bugs that could remotely exploit systems and which were also being actively targeted by in-the-wild attacks.

From 2012 to 2013, the total number of vulnerabilities seen by Secunia increased by 32%. Secunia officials said the spike largely stemmed from vulnerabilities reported in IBM products jumping from 772 bugs in 2012 to 4,181 bugs in 2013. Of those, 74% could be used to attack a remote network, 20% a local network, and 7% a local system.

[Don't miss any of the news coming this week from the annual RSA Conference. See RSA Conference 2014: Complete Coverage.]

Asked to comment on Secunia's findings, IBM offered a different set of statistics, based on counting any given vulnerability, even if present in more than one of its products, only once. "It's important that these vulnerabilities are measured accurately," said IBM spokeswoman Nicole Trager via email. "IBM reports unique vulnerabilities -- each unique vulnerability could affect more than one IBM product."

Using that approach, the total number of vulnerabilities reported in IBM's products increased by 260%, rather than the 400% seen by Secunia. "In 2012, there were approximately 250 vulnerabilities reported by IBM," Trager said. "In 2013, there were approximately 650 vulnerabilities reported by IBM. In both 2012 and 2013, approximately one-third of these vulnerabilities are Java vulnerabilities."

(Image credit: Purple Slog.)
(Image credit: Purple Slog.)

Regardless of whether the Secunia or IBM approach is used to count bugs, what accounts for the significant increase in the number of vulnerabilities that were found in IBM's products last year? "Honestly, we don't know," said Morten Stengaard, CTO of Secunia, in an interview at the RSA information security conference this week in San Francisco. One potential explanation is that there were more third-party products bundled into IBM's offerings, in which bugs were found. But Stengaard said the increase doesn't seem to square with a sudden spike in third-party software vulnerabilities being reported, for example in Java.

The IBM question aside, there is good news in the report. Secunia found that a patch was released for 79% of all vulnerabilities on the same day that the vulnerability was publicly disclosed, compared to 70% in 2012. Likewise, 86% of the vulnerabilities discovered in the top 50 most popular products and operating systems were also patched on the day of disclosure, although that was a slight decrease from 90% in 2012. Regardless, fast patching is good news for IT administrators, because it means they can apply patches before attackers have a chance to reverse-engineer and exploit the underlying vulnerabilities.

As that suggests, patch management is a never-ending task, involving not just Microsoft's monthly Patch Tuesday -- which also typically sees patches issued by Adobe, for example for Flash and Shockwave -- as well as quarterly patches from Oracle, and all the patches vendors issue on a purely ad hoc basis.

Continuing an ongoing trend, in 2013 Microsoft's products -- which made up 33 (66%) of the 50 most popular applications -- accounted for a relatively low number of vulnerabilities. For example, of the vulnerabilities affecting the 50 most-used PC applications on private PCs in 2013, Secunia found that only 16% of the bugs affected Microsoft products or operating systems, up from 8% in 2012. The increase was largely due to Windows 8 bundling more third-party software than Windows 7, as well as more Microsoft applications being among the top 50. The other vulnerabilities affected operating systems (5.5% of all total vulnerabilities) but were overwhelmingly due to non-Microsoft applications (86%).

What's the takeaway from those findings? According to Secunia's Stengaard, many IT managers put the greatest emphasis on patching Microsoft and Adobe applications: "So on Patch Tuesday, they go to work, but then they're only mitigating 25% of the risk."

What happens, however, if a vulnerability is reported, but no patch is yet available? In that case, when possible, consider uninstalling the vulnerable application and using an alternative. For example, Secunia CEO Peter Colsted, in an interview at RSA, said that after a zero-day attack against Adobe Reader surfaced last year, Secunia deleted the application from its employees' PCs and temporarily installed an alternative, free PDF reader instead. About a week later, after Adobe released a patched version of Reader, Secunia reinstalled the software.

Having a wealth of data is a good thing -- if you can make sense of it. Most companies are challenged with aggregating and analyzing the plethora of data being generated by their security applications and devices. This Dark Reading report, How Existing Security Data Can Help ID Potential Attacks, recommends how to effectively leverage security data in order to make informed decisions and spot areas of vulnerability. (Free registration required.)

Mathew Schwartz served as the InformationWeek information security reporter from 2010 until mid-2014. View Full Bio

Comment  | 
Print  | 
More Insights
//Comments
Newest First  |  Oldest First  |  Threaded View
J_Brandt
J_Brandt,
User Rank: Apprentice
2/27/2014 | 7:45:53 PM
Re: Microsoft bugs are like airplane crashes ...
I like your airplane analogy! :) But yes, credit to Microsoft for doing a good job tackling the bugs.  Security programming still hasn't reached enough of a "baked in" status in enough organizations.
Mathew
Mathew,
User Rank: Apprentice
2/27/2014 | 12:14:46 PM
Re: Microsoft bugs are like airplane crashes ...
I couldn't agree more. One consistently sounded note -- by security experts -- at this week's RSA conference in San Francisco has been praise for how well Microsoft has cracked down on bugs in its products. If more businesses had a hardcore secure development lifecycle or "trustworthy computing" culture we'd have to deal with a lot fewer of these bugs.
David F. Carr
David F. Carr,
User Rank: Strategist
2/27/2014 | 11:31:53 AM
Microsoft bugs are like airplane crashes ...
Microsoft bugs are like airplane crashes ... good that they're rarer than we might imagine, but they take more people down with them when they happen.

Still, Microsoft deserves more credit than it usually gets for tightening up software security.
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file