Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:42 AM
Connect Directly

Report: From Bug Disclosure to Exploit in 24 Hours

New IBM ISS report shows fast and furious nature of Web browser vulnerability finds and attacks

Within 24 hours of a new Web vulnerability going public, an exploit gets released and attacks begin, according to a new report from IBM ISS’s X-Force on vulnerability trends in the first half of 2008.

The report also emphasized how the Web browser is the new bull’s eye for attackers: Nearly 60 percent of all client-side exploits were aimed at the browser, versus less than 20 percent at the operating system.

Kris Lamb, manager of X-Force Operations, says he was surprised at how much the new data underlined the trend of browser attacks, overshadowing that of the operating system and other points on the desktop. “Many of us in the industry have been saying this for some time, but it has never had a lot of quantitative data to back up the qualitative observation. I think this report settles it once and for all,” Lamb says.

“The browser is the new end point and an enterprise security strategy around this area of risk and growing concern better be comprehensive and holistic,” he says. “We don't expect any of the client side browser trends to be a flash in the pan for 2008 only.”

Even scarier is how fast vulnerability disclosure leads to exploit code and attacks in Web and other major vulnerability categories: “Where we used to talk days, it now appears we need to start talking hours,” Lamb says.

This expedient exploit trend has a lot to do, of course, with the wealth of automated exploit toolkits. In the first half of the year, over 80 percent of all exploits (not just Web ones) were unleashed on the day of, or before, the official vulnerability disclosure, according to the report. And 94 percent of all browser-related exploits went public within 24 hours of official vulnerability disclosure, compared with 79 percent in 2007.

But the bad guys aren’t necessarily going for the innovative attacks. According to the report, the most popular browser exploits in the first half were one to two years old, many dating back to 2006 (and that have patches). “Being a bad guy has become a lot more about commodity activities and security research reuse than about being top tier security researchers in their own right,” Lamb says.

Meanwhile, the focus is increasingly on exploiting flaws in browser plug-ins, according to the IBM ISS report. Over 50 percent of all browser vulnerabilities disclosed in the first half of the year were in browser plug-in applications, and 78 percent of all public browser exploits were aimed at plug-ins, versus 22 percent at the browser itself. ActiveX plug-ins were some of the biggest offenders, according to the report.

On the Web server side, SQL injection ruled, with 40 percent of the vulnerability disclosures, followed by cross-site scripting with fewer than 35 percent. And the report also highlighted one of IBM ISS’s (and other security vendors’) pet causes: responsible disclosure. About 70 percent of all vulnerability disclosures came from independent researchers in the past year and a half, according to the report, and research organizations (including X-Force) find about 80 percent of critical bugs. And indie researchers are nearly twice as likely to have exploit code released the same day their bug is disclosed, the report says.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • IBM Internet Security Systems

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
    David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
    Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
    Robert Lemos, Contributing Writer,  7/7/2021
    It's in the Game (but It Shouldn't Be)
    Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    The State of Cybersecurity Incident Response
    In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2021-08-05
    Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.2 when adding a blog and then editing an image file.
    PUBLISHED: 2021-08-05
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
    PUBLISHED: 2021-08-05
    A flaw was found in Wildfly Elytron where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality. This flaw affectes Wildfly Elytron versions prior to 1.10.14.Final, prior to 1.15.5.Final and prior to 1.16.1.Final.
    PUBLISHED: 2021-08-05
    A vulnerability was found in the Linux kernel in versions before v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.
    PUBLISHED: 2021-08-05
    Unprotected Transport of Credentials vulnerability in SiteManager provisioning service allows local attacker to capture credentials if the service is used after provisioning. This issue affects: Secomea SiteManager All versions prior to 9.5 on Hardware.