Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

1/20/2010
09:34 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Industry-Standard Updater For Third-Party Apps Fails To Materialize

Secunia decides to go it alone after failing to get buy-in from other vendors to create a standard

Secunia has abandoned an effort it first launched last April to bring together security vendors to create an industry-standard automatic updater for third-party applications -- and instead has come up with software of its own.

The industry model never materialized because Secunia was unable to get other security vendors to commit to the effort. "There were a lot of good intentions," says Thomas Kristensen, CTO of Secunia. "For whatever reason, [vendors] can't or won't [participate in the initiative]," which Secunia first announced at last year's RSA Conference.

Kristensen says Secunia received positive feedback from some vendors, but none officially committed to participate. Some suggested Secunia take the first steps in developing this software to see if a universal automatic updater for third-party applications was a realistic model, he says. "So we figured rather than try to lobby them to join forces, we would spend our efforts and stick to the promise and do it ourselves," he says. Secunia announced this week that it has begun limited beta tests of a simplified patch management tool that combines its Corporate Software Inspector with Microsoft's Windows Server Update Services (WSUS), with full beta available next month.

Third-party applications on Windows increasingly have become the hot target for bad guys, with the majority of vulnerabilities on Windows machines coming from these third-party tools, according to recent data from Microsoft. Adobe, which has been one of the biggest targets during the past year, recently launched its own automatic update service for its applications.

Rick Carlson, president of Panda Security USA, says keeping third-party applications up-to-date is a "massive problem" for consumer users. "Consumers don't know the term 'patch management,' nor should they need to," Carlson says. "I think it's going to take a system built into the OS that enables third-party applications to handle these patches in a more uniform way...Keeping the software on systems up-to-date should be an automated process that takes place as part of the OS."

Secunia, meanwhile, hasn't given up its hope for an updater standard. Kristensen says the company would still like the industry to come up with a universal updater that standardizes the way all applications are installed, distributed, and updated. "But we need to have other vendors joining forces on this," he says. "So now we need to go proprietary, using the WSUS Microsoft standard...Maybe that's the way everyone should go."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Ways to Up Your Threat Management Game
Wayne Reynolds, Advisory CISO, Kudelski Security,  2/26/2020
Exploitation, Phishing Top Worries for Mobile Users
Robert Lemos, Contributing Writer,  2/28/2020
Kr00k Wi-Fi Vulnerability Affected a Billion Devices
Robert Lemos, Contributing Writer,  2/26/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3006
PUBLISHED: 2020-02-28
On the QFX3500 and QFX3600 platforms, the number of bytes collected from the RANDOM_INTERRUPT entropy source when the device boots up is insufficient, possibly leading to weak or duplicate SSH keys or self-signed SSL/TLS certificates. Entropy increases after the system has been up and running for so...
CVE-2015-5361
PUBLISHED: 2020-02-28
Background For regular, unencrypted FTP traffic, the FTP ALG can inspect the unencrypted control channel and open related sessions for the FTP data channel. These related sessions (gates) are specific to source and destination IPs and ports of client and server. The design intent of the ftps-extensi...
CVE-2020-6803
PUBLISHED: 2020-02-28
An open redirect is present on the gateway's login page, which could cause a user to be redirected to a malicious site after logging in.
CVE-2020-6804
PUBLISHED: 2020-02-28
A reflected XSS vulnerability exists within the gateway, allowing an attacker to craft a specialized URL which could steal the user's authentication token. When combined with CVE-2020-6803, an attacker could fully compromise the system.
CVE-2019-4301
PUBLISHED: 2020-02-28
BigFix Self-Service Application (SSA) is vulnerable to arbitrary code execution if Javascript code is included in Running Message or Post Message HTML.