Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:42 AM
Connect Directly

Report: From Bug Disclosure to Exploit in 24 Hours

New IBM ISS report shows fast and furious nature of Web browser vulnerability finds and attacks

Within 24 hours of a new Web vulnerability going public, an exploit gets released and attacks begin, according to a new report from IBM ISS’s X-Force on vulnerability trends in the first half of 2008.

The report also emphasized how the Web browser is the new bull’s eye for attackers: Nearly 60 percent of all client-side exploits were aimed at the browser, versus less than 20 percent at the operating system.

Kris Lamb, manager of X-Force Operations, says he was surprised at how much the new data underlined the trend of browser attacks, overshadowing that of the operating system and other points on the desktop. “Many of us in the industry have been saying this for some time, but it has never had a lot of quantitative data to back up the qualitative observation. I think this report settles it once and for all,” Lamb says.

“The browser is the new end point and an enterprise security strategy around this area of risk and growing concern better be comprehensive and holistic,” he says. “We don't expect any of the client side browser trends to be a flash in the pan for 2008 only.”

Even scarier is how fast vulnerability disclosure leads to exploit code and attacks in Web and other major vulnerability categories: “Where we used to talk days, it now appears we need to start talking hours,” Lamb says.

This expedient exploit trend has a lot to do, of course, with the wealth of automated exploit toolkits. In the first half of the year, over 80 percent of all exploits (not just Web ones) were unleashed on the day of, or before, the official vulnerability disclosure, according to the report. And 94 percent of all browser-related exploits went public within 24 hours of official vulnerability disclosure, compared with 79 percent in 2007.

But the bad guys aren’t necessarily going for the innovative attacks. According to the report, the most popular browser exploits in the first half were one to two years old, many dating back to 2006 (and that have patches). “Being a bad guy has become a lot more about commodity activities and security research reuse than about being top tier security researchers in their own right,” Lamb says.

Meanwhile, the focus is increasingly on exploiting flaws in browser plug-ins, according to the IBM ISS report. Over 50 percent of all browser vulnerabilities disclosed in the first half of the year were in browser plug-in applications, and 78 percent of all public browser exploits were aimed at plug-ins, versus 22 percent at the browser itself. ActiveX plug-ins were some of the biggest offenders, according to the report.

On the Web server side, SQL injection ruled, with 40 percent of the vulnerability disclosures, followed by cross-site scripting with fewer than 35 percent. And the report also highlighted one of IBM ISS’s (and other security vendors’) pet causes: responsible disclosure. About 70 percent of all vulnerability disclosures came from independent researchers in the past year and a half, according to the report, and research organizations (including X-Force) find about 80 percent of critical bugs. And indie researchers are nearly twice as likely to have exploit code released the same day their bug is disclosed, the report says.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • IBM Internet Security Systems

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 7/6/2020
    Ripple20 Threatens Increasingly Connected Medical Devices
    Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
    DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
    Dark Reading Staff 6/30/2020
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    How Cybersecurity Incident Response Programs Work (and Why Some Don't)
    This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2020-07-07
    MobileIron Core and Connector before, 10.4.x before, 10.5.x before, 10.5.2.x before, and 10.6.x before, and Sentry before 9.7.3 and 9.8.x before 9.8.1, allow remote attackers to execute arbitrary code via unspecified vectors.
    PUBLISHED: 2020-07-07
    MobileIron Core and Connector before, 10.4.x before, 10.5.x before, 10.5.2.x before, and 10.6.x before allow remote attackers to bypass authentication mechanisms via unspecified vectors.
    PUBLISHED: 2020-07-07
    MobileIron Core and Connector before, 10.4.x before, 10.5.x before, 10.5.2.x before, and 10.6.x before allow remote attackers to read files on the system via unspecified vectors.
    PUBLISHED: 2020-07-07
    In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using "contextIsolation" are affecte...
    PUBLISHED: 2020-07-07
    In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-window events where the `url` or `options` is not ...