Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/7/2010
03:17 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

September Month Of Bugs Under Way

Researchers say goal is to provide more details on some key known flaws, as well as expose some new zero-day vulnerabilities

The Month of Bugs disclosure model is back, this time mostly detailing some already-known vulnerabilities, and with some zero-day bugs sprinkled into the mix.

Research firm Abysssec is featuring a different bug each day in September, including bugs in Microsoft, Adobe, Mozilla, Novell, and HP software. "We saw [the] damages about 'full disclosure' [over the] years and recently vulnerabilities of enterprise vendors, so we won't be evil ... but we would like to show people [the] true style of advisories because vulnerability research companies like ZDI, iDefense, and ETC won't share enough information about valuable vulnerabilities," says Shahin Ramezany, CTO at Abysssec, which kicked off its month of bugs on Sept. 1 with what the researchers show as an Adobe Acrobat zero-day bug they discovered.

Ramezany says the researchers will post in-depth analyses of software bugs. The goal is to provide researchers with more information about the vulnerabilities, he says. And the researchers will include "critical" zero-day flaw disclosures on some Web and enterprise applications, he says. "And as a note for those advisories which can 'put customers at risk,' we will [notify] vendors, but we won't wait six months for vendor response, for sure," he says.

The zero-days will include proofs-of-concept and exploits for Microsoft Excel, Internet Explorer, Microsoft codecs, Cpanel, and other software, according to Abysssec's blog. Today's vulnerability is a Novell NetWare parsing buffer-overflow flaw.

The month of bugs model has a long history, starting back in 2006 with HD Moore's Month of Browser Bugs and, more recently, with another researcher's month of Twitter bugs.

"This [latest] effort is a bit different from others using the 'month of' moniker in that instead of focusing on a specific vendor or class of issues, they are presenting a large set of results from their own research," says Moore, chief security officer at Rapid7 and chief architect of Metasploit. "Instead of highlighting a particular class of bugs, it's mostly just showing off the work that their team has accomplished."

Moore says it's hard to say how effective this approach is because there doesn't appear to be a specific goal to the approach aside from getting some publicity for their own work, he says. "Many of the bugs are previously disclosed issues, and while everyone doing this kind of work appreciates more details, it doesn't seem to justify a 'month of' series," Moore says.

But it's still free research that covers some interesting bugs and has more useful information than what's found in most advisories, Moore says. "So no complaints," he says.

Releasing zero-day bugs indeed comes with its risks, and vendors should be given a "reasonable" window to patch the flaws, notes security expert Lucas Lundgren. "But the information supplied [by Abysssec] is great, and I believe the vendors can take that into mind and use it when developing applications. They have this huge analysis, and now they can see how these bugs are found and in what areas the need to improve."

Month of bugs and other projects can also raise end user awareness, Lundgren says. "Even my grandma told me not to open any PDF files from unknown sources," Lundgren says.

Meanwhile, researchers have been turning up the heat on vendors to get out patches more rapidly by instituting deadlines for vendors to patch -- or the researchers will go public with the flaw discoveries. Rapid7, for instance, recently set a deadline for bug disclosures of 15 days: If a vendor hasn't patched it by then, then Rapid7 reports the bug to CERT, which gives vendors 45 days to patch from the initial report date before it goes public.

Google set a 60-day deadline for vendors to fix vulnerabilities it finds in their products before going public, and TippingPoint's Zero Day Initiative (ZDI) now works on a six-month time frame from when it reports a bug to a vendor until it goes public with it. But Microsoft has held firm in its position that timetables don't work for patches. Mike Reavey, director of Microsoft Security Response Center, recently said that patch deadlines aren't the answer because it's not a "one-size-fits-all" time frame for fixing vulnerabilities -- some just take longer to fix than others.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8015
PUBLISHED: 2020-04-02
A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.
CVE-2020-1927
PUBLISHED: 2020-04-02
In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
CVE-2020-8144
PUBLISHED: 2020-04-01
The UniFi Video Server v3.9.3 and prior (for Windows 7/8/10 x64) web interface Firmware Update functionality, under certain circumstances, does not validate firmware download destinations to ensure they are within the intended destination directory tree. It accepts a request with a URL to firmware u...
CVE-2020-8145
PUBLISHED: 2020-04-01
The UniFi Video Server (Windows) web interface configuration restore functionality at the “backup� and “wizard� endpoints does not implement sufficient privilege checks. Low privileged users, belonging to the PUBLIC_GROUP ...
CVE-2020-8146
PUBLISHED: 2020-04-01
In UniFi Video v3.10.1 (for Windows 7/8/10 x64) there is a Local Privileges Escalation to SYSTEM from arbitrary file deletion and DLL hijack vulnerabilities. The issue was fixed by adjusting the .tsExport folder when the controller is running on Windows and adjusting the SafeDllSearchMode in the win...