Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/7/2010
03:17 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

September Month Of Bugs Under Way

Researchers say goal is to provide more details on some key known flaws, as well as expose some new zero-day vulnerabilities

The Month of Bugs disclosure model is back, this time mostly detailing some already-known vulnerabilities, and with some zero-day bugs sprinkled into the mix.

Research firm Abysssec is featuring a different bug each day in September, including bugs in Microsoft, Adobe, Mozilla, Novell, and HP software. "We saw [the] damages about 'full disclosure' [over the] years and recently vulnerabilities of enterprise vendors, so we won't be evil ... but we would like to show people [the] true style of advisories because vulnerability research companies like ZDI, iDefense, and ETC won't share enough information about valuable vulnerabilities," says Shahin Ramezany, CTO at Abysssec, which kicked off its month of bugs on Sept. 1 with what the researchers show as an Adobe Acrobat zero-day bug they discovered.

Ramezany says the researchers will post in-depth analyses of software bugs. The goal is to provide researchers with more information about the vulnerabilities, he says. And the researchers will include "critical" zero-day flaw disclosures on some Web and enterprise applications, he says. "And as a note for those advisories which can 'put customers at risk,' we will [notify] vendors, but we won't wait six months for vendor response, for sure," he says.

The zero-days will include proofs-of-concept and exploits for Microsoft Excel, Internet Explorer, Microsoft codecs, Cpanel, and other software, according to Abysssec's blog. Today's vulnerability is a Novell NetWare parsing buffer-overflow flaw.

The month of bugs model has a long history, starting back in 2006 with HD Moore's Month of Browser Bugs and, more recently, with another researcher's month of Twitter bugs.

"This [latest] effort is a bit different from others using the 'month of' moniker in that instead of focusing on a specific vendor or class of issues, they are presenting a large set of results from their own research," says Moore, chief security officer at Rapid7 and chief architect of Metasploit. "Instead of highlighting a particular class of bugs, it's mostly just showing off the work that their team has accomplished."

Moore says it's hard to say how effective this approach is because there doesn't appear to be a specific goal to the approach aside from getting some publicity for their own work, he says. "Many of the bugs are previously disclosed issues, and while everyone doing this kind of work appreciates more details, it doesn't seem to justify a 'month of' series," Moore says.

But it's still free research that covers some interesting bugs and has more useful information than what's found in most advisories, Moore says. "So no complaints," he says.

Releasing zero-day bugs indeed comes with its risks, and vendors should be given a "reasonable" window to patch the flaws, notes security expert Lucas Lundgren. "But the information supplied [by Abysssec] is great, and I believe the vendors can take that into mind and use it when developing applications. They have this huge analysis, and now they can see how these bugs are found and in what areas the need to improve."

Month of bugs and other projects can also raise end user awareness, Lundgren says. "Even my grandma told me not to open any PDF files from unknown sources," Lundgren says.

Meanwhile, researchers have been turning up the heat on vendors to get out patches more rapidly by instituting deadlines for vendors to patch -- or the researchers will go public with the flaw discoveries. Rapid7, for instance, recently set a deadline for bug disclosures of 15 days: If a vendor hasn't patched it by then, then Rapid7 reports the bug to CERT, which gives vendors 45 days to patch from the initial report date before it goes public.

Google set a 60-day deadline for vendors to fix vulnerabilities it finds in their products before going public, and TippingPoint's Zero Day Initiative (ZDI) now works on a six-month time frame from when it reports a bug to a vendor until it goes public with it. But Microsoft has held firm in its position that timetables don't work for patches. Mike Reavey, director of Microsoft Security Response Center, recently said that patch deadlines aren't the answer because it's not a "one-size-fits-all" time frame for fixing vulnerabilities -- some just take longer to fix than others.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13545
PUBLISHED: 2019-10-18
In Horner Automation Cscape 9.90 and prior, improper validation of data may cause the system to write outside the intended buffer area, which may allow arbitrary code execution.
CVE-2019-13541
PUBLISHED: 2019-10-18
In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an attacker to access information and remotely execute arbitrary code.
CVE-2019-17367
PUBLISHED: 2019-10-18
OpenWRT firmware version 18.06.4 is vulnerable to CSRF via wireless/radio0.network1, wireless/radio1.network1, firewall, firewall/zones, firewall/forwards, firewall/rules, network/wan, network/wan6, or network/lan under /cgi-bin/luci/admin/network/.
CVE-2019-17393
PUBLISHED: 2019-10-18
The Customer's Tomedo Server in Version 1.7.3 communicates to the Vendor Tomedo Server via HTTP (in cleartext) that can be sniffed by unauthorized actors. Basic authentication is used for the authentication, making it possible to base64 decode the sniffed credentials and discover the username and pa...
CVE-2019-17526
PUBLISHED: 2019-10-18
** DISPUTED ** An issue was discovered in SageMath Sage Cell Server through 2019-10-05. Python Code Injection can occur in the context of an internet facing web application. Malicious actors can execute arbitrary commands on the underlying operating system, as demonstrated by an __import__('os').pop...