Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:40 AM
Connect Directly

iDefense Offers Bucks for New Bugs

The latest zero-day bug-hunting contest goes after core Internet and intranet applications

Ready, set, hack: iDefense Labs's latest vulnerability contest targets none other than the Internet infrastructure.

iDefense is awarding anywhere from $16,000 to $24,000 to hackers who find a new (as in zero-day) vulnerability in Apache httpd, Berkeley Internet Name Domain (BIND) daemon, Sendmail SMTP daemon, Open SSH sshd, Microsoft Internet Information Server, or Microsoft Exchange Server.

"These are the core apps that allow the Net to run -- you've got Web servers like Apache, mail servers like Exchange and Sendmail, all part of any installation that connects to the Net," says Fred Doyle, director of iDefense Labs, a unit of VeriSign Inc. These applications could also be found in intranet environments, he says.

Doyle says iDefense chose the Internet technologies because they "looked like a good target, and we know it's going to be a difficult target." So iDefense extended the competition to both the second and third quarters of this year, with the deadline of before midnight, September 30.

iDefense will award $16,000 to the winning vulnerability for any of the Internet infrastructure technologies. The vulnerability has to be remotely exploitable, and allow arbitrary code execution, and you can win an extra $2,000 to $8,000 for a working exploit to go along with the bug.

Bug bounties are controversial, however, and the recent 3Com/TippingPoint $10,000 award at CanSecWest for hack-a-MacBook Pro (pwn-2-own) contest triggered more debate on the issue. 3Com/TippingPoint was accused by some critics of offering a prize that in turn gave it ownership of a potentially big bug it could use as a marketing tool for its own products. (See That's How Rumors Start).

"What bothered me on that was it's literally like the old fire insurance scams in New York by the mob. On one hand they are selling fire insurance, yet they are paying people to light fires," says Paul Henry, VP of technology evangelism for Secure Computing.

Henry says paying hackers to find vulnerabilities in other vendors' equipment and then offering paid services to protect users from it isn't fair, he says. "The bottom line is people paying them as subscribers were able get updates and literally protect selves faster than rest of user community, which had to wait for a patch from Apple."

"If you want to run contests, run them against your own gear," he says.

iDefense's Doyle says the company provides its customers as well as affected vendors with advanced notification of the vulnerability. "We are a responsible disclosure shop," he says. "We go to the vendor and our customers at the same time."

But critics say bug contests don't always yield leading-edge vulnerability research, anyway.

Meanwhile, here are some ground rules for the latest iDefense contest: The vulnerability must be in the latest (and patched) version of software (no betas, please); it must be original and not previously disclosed; it can't be used by any third-party software on the system; and no social engineering.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • 3Com Corp. (Nasdaq: COMS)
  • Apple Inc. (Nasdaq: AAPL)
  • iDefense Labs
  • Microsoft Corp. (Nasdaq: MSFT)
  • Secure Computing Corp. (Nasdaq: SCUR)
  • VeriSign Inc. (Nasdaq: VRSN)

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Data Privacy Protections for the Most Vulnerable -- Children
    Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
    Sodinokibi Ransomware: Where Attackers' Money Goes
    Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    2019 Online Malware and Threats
    2019 Online Malware and Threats
    As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2019-10-19
    Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
    PUBLISHED: 2019-10-19
    templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
    PUBLISHED: 2019-10-18
    In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
    PUBLISHED: 2019-10-18
    In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclo...
    PUBLISHED: 2019-10-18
    HCL Traveler versions 9.x and earlier are susceptible to cross-site scripting attacks. On the Problem Report page of the Traveler servlet pages, there is a field to specify a file attachment to provide additional problem details. An invalid file name returns an error message that includes the entere...