Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Vulnerability Disclosures Increase By 36% In 2010

IBM report finds "escape to hypervisor" attacks a growing virtualization concern.




Slideshow: Cloud Security Pros And Cons
(click for larger image and for full photo gallery)
Vulnerability disclosures have reached record levels, with 4,396 new vulnerabilities documented in the first half of 2010 -- a 36% increase over the same period last year. That's according to a new IBM X-Force report, released Wednesday.

Web applications accounted for the majority (55%) of those vulnerability disclosures, but IBM's report cautioned that many more vulnerabilities may exist in custom web applications.

Obfuscated attacks, which allow attackers to sneak malicious code past traditional security tools, increased 52% from the first half of 2009 to the first half of 2010. JavaScript obfuscation is one particularly popular attack, said IBM, because it allows attackers "to hide their exploits within document files and web pages."

But three of the five most popular online attacks seen by IBM in the first half of 2010 involved PDF exploits. Such attacks peaked in April during a widespread spam campaign, largely driven by Zeus and Pushdo botnets distributing massive quantities of malicious PDF files via e-mail.

The good security news for the year to date is that phishing attacks have significantly declined, although the attack's primary impetus -- stealing financial data -- remains the same. Reviewing phishing e-mails, IBM found that the principal target is financial institutions (for 49% of attacks), followed by credit cards (28%), government agencies (11%), online payments (6%), and auctions (5%).

Today, virtualization vulnerabilities account for only a small subset of all code vulnerabilities. But IBM warned there's still cause for concern with virtualization security, since "35% of vulnerabilities impacting server class virtualization systems affect the hypervisor." The hypervisor is responsible for providing the platform on which guest operating systems run.

By hacking the hypervisor or gaining control of one of the virtual systems and using an "escape to hypervisor" vulnerability, an attacker might gain access to any system running on the same PC or server. The upshot is that businesses should think "about the wisdom of sharing workloads with different security requirements on the same physical hardware," according to IBM's report.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23396
PUBLISHED: 2021-06-17
All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function.
CVE-2021-32681
PUBLISHED: 2021-06-17
Wagtail is an open source content management system built on Django. A cross-site scripting vulnerability exists in versions 2.13-2.13.1, versions 2.12-2.12.4, and versions prior to 2.11.8. When the `{% include_block %}` template tag is used to output the value of a plain-text StreamField block (`Ch...
CVE-2013-20002
PUBLISHED: 2021-06-17
Elemin allows remote attackers to upload and execute arbitrary PHP code via the Themify framework (before 1.2.2) wp-content/themes/elemin/themify/themify-ajax.php file.
CVE-2020-19202
PUBLISHED: 2021-06-17
An authenticated Stored XSS (Cross-site Scripting) exists in the "captive.cgi" Captive Portal via the "Title of Login Page" text box or "TITLE" parameter in IPFire 2.21 (x86_64) - Core Update 130. It allows an authenticated WebGUI user with privileges for the affected p...
CVE-2020-35373
PUBLISHED: 2021-06-17
In Fiyo CMS 2.0.6.1, the 'tag' parameter results in an unauthenticated XSS attack.