Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/7/2010
03:17 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

September Month Of Bugs Under Way

Researchers say goal is to provide more details on some key known flaws, as well as expose some new zero-day vulnerabilities

The Month of Bugs disclosure model is back, this time mostly detailing some already-known vulnerabilities, and with some zero-day bugs sprinkled into the mix.

Research firm Abysssec is featuring a different bug each day in September, including bugs in Microsoft, Adobe, Mozilla, Novell, and HP software. "We saw [the] damages about 'full disclosure' [over the] years and recently vulnerabilities of enterprise vendors, so we won't be evil ... but we would like to show people [the] true style of advisories because vulnerability research companies like ZDI, iDefense, and ETC won't share enough information about valuable vulnerabilities," says Shahin Ramezany, CTO at Abysssec, which kicked off its month of bugs on Sept. 1 with what the researchers show as an Adobe Acrobat zero-day bug they discovered.

Ramezany says the researchers will post in-depth analyses of software bugs. The goal is to provide researchers with more information about the vulnerabilities, he says. And the researchers will include "critical" zero-day flaw disclosures on some Web and enterprise applications, he says. "And as a note for those advisories which can 'put customers at risk,' we will [notify] vendors, but we won't wait six months for vendor response, for sure," he says.

The zero-days will include proofs-of-concept and exploits for Microsoft Excel, Internet Explorer, Microsoft codecs, Cpanel, and other software, according to Abysssec's blog. Today's vulnerability is a Novell NetWare parsing buffer-overflow flaw.

The month of bugs model has a long history, starting back in 2006 with HD Moore's Month of Browser Bugs and, more recently, with another researcher's month of Twitter bugs.

"This [latest] effort is a bit different from others using the 'month of' moniker in that instead of focusing on a specific vendor or class of issues, they are presenting a large set of results from their own research," says Moore, chief security officer at Rapid7 and chief architect of Metasploit. "Instead of highlighting a particular class of bugs, it's mostly just showing off the work that their team has accomplished."

Moore says it's hard to say how effective this approach is because there doesn't appear to be a specific goal to the approach aside from getting some publicity for their own work, he says. "Many of the bugs are previously disclosed issues, and while everyone doing this kind of work appreciates more details, it doesn't seem to justify a 'month of' series," Moore says.

But it's still free research that covers some interesting bugs and has more useful information than what's found in most advisories, Moore says. "So no complaints," he says.

Releasing zero-day bugs indeed comes with its risks, and vendors should be given a "reasonable" window to patch the flaws, notes security expert Lucas Lundgren. "But the information supplied [by Abysssec] is great, and I believe the vendors can take that into mind and use it when developing applications. They have this huge analysis, and now they can see how these bugs are found and in what areas the need to improve."

Month of bugs and other projects can also raise end user awareness, Lundgren says. "Even my grandma told me not to open any PDF files from unknown sources," Lundgren says.

Meanwhile, researchers have been turning up the heat on vendors to get out patches more rapidly by instituting deadlines for vendors to patch -- or the researchers will go public with the flaw discoveries. Rapid7, for instance, recently set a deadline for bug disclosures of 15 days: If a vendor hasn't patched it by then, then Rapid7 reports the bug to CERT, which gives vendors 45 days to patch from the initial report date before it goes public.

Google set a 60-day deadline for vendors to fix vulnerabilities it finds in their products before going public, and TippingPoint's Zero Day Initiative (ZDI) now works on a six-month time frame from when it reports a bug to a vendor until it goes public with it. But Microsoft has held firm in its position that timetables don't work for patches. Mike Reavey, director of Microsoft Security Response Center, recently said that patch deadlines aren't the answer because it's not a "one-size-fits-all" time frame for fixing vulnerabilities -- some just take longer to fix than others.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5607
PUBLISHED: 2020-07-10
Open redirect vulnerability in SHIRASAGI v1.13.1 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
CVE-2020-15001
PUBLISHED: 2020-07-09
An information leak was discovered on Yubico YubiKey 5 NFC devices 5.0.0 to 5.2.6 and 5.3.0 to 5.3.1. The OTP application allows a user to set optional access codes on OTP slots. This access code is intended to prevent unauthorized changes to OTP configurations. The access code is not checked when u...
CVE-2020-15092
PUBLISHED: 2020-07-09
In TimelineJS before version 3.7.0, some user data renders as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file. Most T...
CVE-2020-15093
PUBLISHED: 2020-07-09
The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A ...
CVE-2020-15299
PUBLISHED: 2020-07-09
A reflected Cross-Site Scripting (XSS) Vulnerability in the KingComposer plugin through 2.9.4 for WordPress allows remote attackers to trick a victim into submitting an install_online_preset AJAX request containing base64-encoded JavaScript (in the kc-online-preset-data POST parameter) that is execu...