Security Watch

Counting Vulnerabilities

A vulnerability study based on bad math; cyberwarfare is sexy; more.

Need to be able to cite some sort of explanation as to why there are a ton of vulnerabilities out there? There's a study posted on this blog from IBM Internet Security Systems that provides a highly speculative explanation as to why they believe there are 139,000+ vulnerabilities discovered each year.

The study suggests that the vast majority of vulnerabilities are being discovered "under contract"; the study even goes so far as to suggest that more than three million vulnerabilities are discovered every year by pen-testers under contract. Unfortunately, the essay does a poor job of explaining what a vulnerability is, and strongly suggests that a Web site of 30 pages, each containing the exact same problem, would count as 30 vulnerabilities. Using this sort of math, it's surprising the author didn't come up with numbers in the billions. After all, if there's a billion Windows boxes out there, all with one common vulnerability, then that's a billion vulnerabilities to be discovered right there!

I argue that there's a difference between a "vulnerability" to be discovered, and an implementation flaw that leads to a point of vulnerability. If I put a vanilla Windows XP box on the Internet with a blank administrator password, I haven't created a new vulnerability, merely implemented a vulnerable system. The same is true when people deploy systems with known vulnerabilities present, such as an outdated Apache Web server with known attack points.

In the end, the question you need to ask yourself is how many new vulnerabilities have been discovered in systems you've used since the last time you looked at the security of your system? Or, how often do you check for new vulnerability discoveries in your systems?

This all assumes that what you're interested in is strictly vulnerabilities. I firmly believe that this is a myopic view -- you need to consider risk, not just vulnerability. If there's no threat against your vulnerable system, does its vulnerability matter? The article suggests it doesn't matter, but I believe it makes a significant difference. It even goes so far as to suggest that it doesn't matter how well you secure your systems; the "professionals" will always discover vulnerabilities you haven't mitigated against. It's hogwash FUD intended to sell professional services.

Cyberwarfare Hits Home
A bewildering story at PC World about how the U.S. Department of Defense views China's currently military status: The DoD believes that China has military "units" who develop viruses for use in information warfare.

Well, duh! If you accept that knocking out communications capabilities has been a part of every army since the beginning of time, is it really "news" that viruses might be employed as part of such an effort today? I don't think so. The article also states that China is/has developed abilities to withstand such attacks. Um, are they saying that they use some ICSA Labs-certified anti-virus product? Or are they suggesting they have some way to withstand computer attacks that nobody else has thought of yet The article is meatless in this regard.

Cyberwarfare is a sexy word these days, but could simply denote attempts to disrupt the use of computers during war. That could take the many forms, from knocking out communication capabilities to attempting to implant viruses or rootkits. One would expect that all such means would be used in a conflict ... and why not?

However, if you read the 36-page report, you'll find scant references to China's Information Warfare efforts and capabilities beyond the sound bite already mentioned. Further, if you look at similar reports on other countries, it's hard to believe you wouldn't find very similar statements.

Risky Browser Extention Updates? Maybe
Wired has a piece on third-party browser extension vendors -- who also include the ability to update their extensions via the browser -- that are making updates using plain HTTP rather than HTTP over SSL. As such, it's speculated, users may not realize the update tools are connecting to spoofed sites to obtain the updates. This could allow a criminal to mimic the update server and provide criminally crafted code of their choice to the updater.

Yup, it's possible but highly unlikely. The update method here serves as an example of a problem that requires some other vulnerability to be exploited before it can happen. To become a victim to such an attack, your computer must use a criminally controlled DNS server or have your own DNS cache poisoned.

With all that said, one does have to wonder why an update site wouldn't be SSL!

Want More Security?

This column was originally published in our weekly Security Watch newsletter. To subscribe, click here.

One Small Flaw Looms Big for This P2P
Poor design in an earlier release of their product has led developers of DC++, a file sharing tool, to admit now that "It's difficult to impossible to restrict this." (SecurityFocus has the story here; DC++ has blog post of its own here.) The network is based on a few hubs, which offer up files and millions of clients who want to obtain those files. Earlier versions of the hub server software allowed hub owners to identify the IP address where a file could be found, redirecting clients in search of a file they don't have. Sounded like a pretty good idea at the time; however, now that feature is being abused to point millions of clients seeking a file to a totally unrelated Web server in order to DoS it.

The story is that this is being used to extort monies from site owners. DC++ boasts that there have been 35 million downloads of their software so far, meaning there's a large base of client systems to enlist in your DDoS efforts if you're a criminal.

It's unclear why they couldn't simply introduce something into the hub server software that would prevent down-level clients from being able to connect to them without upgrading. The upgrade would then introduce some client code that would prevent them from communicating with the older version hub servers. This, claims DC++, is impossible.

About the Author

Russ Cooper is a senior information security analyst with Verizon Business, Inc. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most-recognized security experts, he's often quoted by major media outlets on security issues.

comments powered by Disqus
Most   Popular

Upcoming Training Events

0 AM
Live! 360 Orlando
November 17-22, 2024
TechMentor @ Microsoft HQ
August 11-15, 2025