Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

1/19/2012
07:23 PM
50%
50%

Third-Party Vulnerability Counts Down? Not Quite

Trend data from Frost & Sullivan shows that vulnerabilities reported by third parties were lower in 2011, but companies such as Secunia and TippingPoint are seeing greater demand

The number of vulnerabilities plunged in the third quarter of 2011 as reported by third-party firms such as Secunia and HP TippingPoint, according to data collected by analyst firm Frost & Sullivan.

While one provider of vulnerability information temporarily shut down its reporting capability, leading to part of the decline, the overall number of flaws reported by third-party bug bounty programs and intermediaries fell by more than could be accounted for by a single vendor's lack of reporting, the firm stated in the report. Part of the decline could be due to paying for higher quality vulnerabilities, rather than paying for more but less-severe vulnerabilities, says Chris Rodriguez, an industry analyst for network security at Frost & Sullivan.

"While the total number of vulnerabilities decreased, we saw a severity increase, so the focus is on more the high-value, high-severity vulnerabilities," he says.

The data matches a trend documented in early data from IBM Internet Security Systems that showed the total vulnerabilities reported in 2011 fell from the prior year. Yet the same data showed that the number of software security flaws has remained within the same range -- between 6,500 and 7,500 -- for the past five years, with the exception of a peak in 2010.

Any decline in this year's data is not likely to represent a trend, says Thomas Kristensen, chief security officer with Secunia.

"I do believe this is a blip," he says. "Generally speaking, it looks like the number of vulnerabilities has been generally stable for the past five or six years."

Secunia's own Vulnerability Coordination Reward Program has taken off following the company's formal announcement of the initiative last fall, says Kristensen.

[Is secure development paying off? See Security Holes In Software Decreased This Year, Early Data Shows.]

HP TippingPoint's Zero Day Initiative also saw a banner year, according to the firm. In 2011, the company published more than 350 advisories reported by individual researchers, an increase of 15 percent from the previous year.

"Overall, our numbers have gone up every single year," says Jennifer Lake, program manager with HP TippingPoint's DVLabs, which manages the ZDI program.

However, the company does agree that third-party buyers tend to focus on highly critical vulnerabilities. HP TippingPoint aims to purchase vulnerabilities that allow remote exploitation and are of medium severity or higher, says Derek Brown, security liaison for the ZDI program.

"We, ourselves, are trying to be very exclusive when we purchase these vulnerabilities," Brown says. "We are going to give more attention to the higher-rated vulnerabilities."

Among those higher-end vulnerabilities are flaws that affect Web browsers. All three companies agreed that browsers continue to be a major focus of researchers and the bounty programs that buy vulnerabilities. Frost & Sullivan found that 10 browser flaws were reported by third-party program in the third quarter of 2011, with half of those vulnerabilities in Apple's Safari browser. Nearly 10 percent of all vulnerabilities bought by TippingPoint were found in WebKit, the software platform that powers Safari; Mozilla's Firefox; or Microsoft's Internet Explorer.

"Browser vulnerabilities are very valuable, so there are lots of purchasers of browser vulnerabilities," Brown says. "And not all of them are companies with a coordinated disclosure policy."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
CVE-2021-31660
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.