Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/20/2007
03:15 AM
50%
50%

Research Run

Love 'em or hate 'em, security researchers open up whole new vistas on system vulnerability

11:15 AM -- There's been a lot of discussion about the merits of security research in recent weeks. One camp says the research is exposing new vulnerabilities that need to be sealed against the bad guys. The other camp says the vulnerabilities wouldn't be a problem if the researchers didn't keep finding and publishing them.

After looking back at this week's news, I can't help but put myself in the first camp. The research that we've seen in recent days will not only help in the evolution of security products, I think, but it will actually help protect organizations from being hurt by some vulnerabilities that were bound to be discovered by the bad guys.

For example, the Honeynet Project & Research Alliance this week demonstrated that criminal organizations behind two infamous malware families -- Warezov/Stration and Storm -- have begun to use so-called fast-flux service networks. Fast-flux -- basically load-balancing with a twist -- is a round-robin method where infected bot machines (typically home computers) serve as proxies or hosts for malicious Websites. It's been letting the bad guys hide -- but now that it's out in the open, something can be done about it. (See Attackers Hide in Fast Flux.)

Researchers also poked holes in so-called "data leak prevention" tools, an emerging class of products that has received a lot of hype but still needs a lot of work. A pair of researchers has discovered multiple types of flaws in various vendors' DLP products that would let an attacker evade them, alter their records of stolen data, and even use them to bot-infect client machines. (See Black Hat: DLP Hack.)

But research isn't just about finding next-generation bugs. Recently, some surprising flaws have been found in DNS pinning, a technology that's been around for years. One researcher even proved that you can bypass the corporate firewall by converting a victim's browser into a proxy server. (See Hack Sneaks Past Firewall to Intranet and Old Flaw Threatens Web 2.0.)

And guess what? You don't have to be a security pro -- or even an accomplished hacker -- to find some pretty scary vulnerabilities. A privacy-conscious law student this week demonstrated how a simple Google search can lead to extensive personal information in a specific, targeted community. (See Leaks Found in Louisiana University Systems.)

When the Louisiana Commissioner of Education found out about the law student's discovery, he stood up -- egg all over his face -- and thanked the kid for exposing a flaw that could have led to some very serious privacy violations among his constituents. That couldn't have been an easy statement to make, but he was right to be grateful that someone had the guts to show the emperor that he had no clothes.

The industry should be grateful that security researchers do the same thing every day.

— Tim Wilson, Site Editor, Dark Reading

  • Honeynet Project

     

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 8/3/2020
    Pen Testers Who Got Arrested Doing Their Jobs Tell All
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
    Exploiting Google Cloud Platform With Ease
    Dark Reading Staff 8/6/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    Special Report: Computing's New Normal, a Dark Reading Perspective
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    The Changing Face of Threat Intelligence
    The Changing Face of Threat Intelligence
    This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-16168
    PUBLISHED: 2020-08-07
    Temi firmware 20190419.165201 does not properly verify that the source of data or communication is valid, aka an Origin Validation Error.
    CVE-2020-8025
    PUBLISHED: 2020-08-07
    A Incorrect Execution-Assigned Permissions vulnerability in the permissions package of SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Tumbleweed sets the permissions for some of the directories of the p...
    CVE-2020-8026
    PUBLISHED: 2020-08-07
    A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior...
    CVE-2020-16219
    PUBLISHED: 2020-08-07
    Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by processing specially crafted project files. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
    CVE-2020-16221
    PUBLISHED: 2020-08-07
    Delta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.