CERT defends vulnerability info restrictions

Full disclosure increases hack attacks

  • alert
  • submit to reddit

High performance access to file storage

The long-debated question of whether software and network vulnerability data should be shared freely and immediately re-surfaced recently, as Carnegie Mellon University's CERT Coordination Center (CERT/CC), formerly the Computer Emergency Response Team (CERT), announced hooking up with a private-industry organization called the Internet Security Alliance to make its advance alerts and vulnerability database immediately available to members.

Several press reports have suggested that the publicly-funded CERT/CC will be making its database available to those willing to pony up anywhere between $2,500 and $50,000 annually for some manner of subscription service, but this isn't quite right. CERT/CC won't be collecting money directly in exchange for services; the costs cited are actually the ISA membership fees, which vary according to the size of the company seeking to join.

ISA member companies, which include NASDAQ, Mellon Financial Services, AIG, TRW and VeriSign, will have access to the CERT/CC database, or Vulnerability Catalog as it's called, via a secure distribution network, so long as they're willing to sign and abide by a non-disclosure agreement. Members will also receive advance vulnerability reports, and have the opportunity to share such information with one another in confidence.

Previously, CERT had maintained a policy of sharing software vulnerabilities immediately with the two US government bodies which support it, the US Defense Information Systems Agency (DISA) and the US General Services Administration (GSA), and with the software companies concerned. After forty-five days, during which the software vendor was assumed to be fixing its product, the group typically would make abstracts of the vulnerabilities public on its Web site.

CERT/CC says it will not use its public funding to offer new services to private companies, and notes that the cost of making the database available to the private sector will come out of the Alliance's membership fees.

Full Disclosure

That said, CERT still has its detractors among Internet security specialists, many of whom question the fairness of making current threat information which affects all Net users and systems administrators available to a select few, while everyone else must wait over a month for the free abstracts.

"The CERT venture will cost organizations upwards of $2500 per year for....services that are available for free or little cost elsewhere," Network Solutions (NSI) former Chief Security Officer Richard Forno writes in a nice rant posted at Infowarrior.org.

"For small companies without dedicated security staffs -- who don't know where to look for security vulnerability information elsewhere on the Internet and thus rely on CERT advisories as their sole security information -- not being able to participate in the ISA means that they are at a comparative disadvantage to larger companies that can afford such luxuries," Forno observes.

Indeed, a number of security-oriented sites do offer free vulnerability information, often as soon as it's reported. Though many make their full database available as a pay service, it's also true that essential information gets into the public domain notably faster than it does through CERT/CC, and can give a sysadmin a useful heads-up.

Those who advocate full and immediate disclosure maintain that by concealing a vulnerability long enough to enable the vendor to patch it, CERT/CC needlessly exposes the general Net population to exploitation through a hole of which they are blissfully ignorant.

On the other hand, publicizing a vulnerability before a fix is available does make it easy for would-be attackers to discover and exploit flaws they otherwise wouldn't have learned about.

"We do know that we usually see a large increase in attacks that exploit a particular vulnerability shortly after information about that vulnerability becomes public," CERT/CC Director Rich Pethia told The Register.

Pethia says that CERT/CC's own experience suggests that the danger from publicizing an un-patched flaw is greater than the danger from keeping it under wraps.

"While there are strong opinions on both sides of the debate, not all these opinions are supported by empirical data," he said.

"We believe, in the absence of data that demonstrates that attacks are in progress, that the lower risk approach is to publicly release vulnerability data once the technology vendors, or others in the technical community, have had at least an opportunity to find corrections or work-arounds."

So for CERT/CC the crucial question is whether it can be proved that full, immediate disclosure actually reduces exploitation in the real world, on the theory that forewarned is forearmed.

We don't pretend to know the answer to that one, but we'd be happy to hear from readers who think they do. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story


Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.