Feeds

All bugs are created equal

ISS pledges equal treatment for open source and Windows flaws

  • alert
  • submit to reddit

Protecting against web application threats using SSL

Security tools vendor ISS has promised to handle security vulnerabilities affecting open source and Windows platforms the same way following criticism of its premature disclosure of open source security problems.

In recent months, sections of the security community allege that ISS has jumped the gun in releasing information on flaws within a Solaris font daemon, BIND and (most notably) Apache ahead of the widespread availability of a fix. Critics argue ISS acted out of self-promotion rather than the interests of the wider Internet community.

ISS strongly denies this but admits to mistakes in its approach which it addresses through revised vulnerability disclosure guidelines.

Previously, ISS handled open source vulnerability it unearthed on a "case by case basis" but now it will handle Windows and open source platform the same, normally allowing vendors 30 days to respond to problems before publicising them. ISS' X-Force (security researcher team) guidelines for responsible disclosure contain a four-phase process, which includes the initial discovery phase, vendor notification phase, customer notification phase and public disclosure phase, explained in greater depth here.

ISS is a founding member of the Organisation for Internet Safety (OIS), whose guidelines on disclosing security vulnerabilities are backed by Microsoft. This, together with its handling of various open source vulnerabilities, have cause critics to question ISS' motives.

The issue first arose this summer when ISS included a working patch in the advisory on a bug involving Apache. ISS says it did this "because of the concern over leaks in the open source patching process".

Chris Rouland, director of ISS' X-Force, told us that releasing a patch with the advisory was a mistake which ISS will not repeat again.

"The patch was not well received and from now on we'll let vendor fix problems themselves," he told us.

Part of the problem with ISS' patch was that it dealt with a chunk encoding remote root compromise flaw but not another flaw found by security researcher David Litchfield around the same time.

"We patched the flaw we found, which hackers had already found. The exploit was four months old," Rouland told us.

Further criticisms of ISS' actions came when it released advisories of BIND and Sun daemon bugs ahead of the general availability of patches from vendors. These issues are more easily explained as breakdowns in communication.

In the case of both ISC (BIND) and Sun, both vendors actually edited the ISS advisories prior to release. According to ISS, the release times of these advisories were closely co-ordinated between it and affected vendors.

ISC made a business decision to provide their paying customers patches first, then distributing patches via email, and finally that day, they provided the patches over FTP.

Sun discovered their patches were not functioning properly and was unable to distribute them.

"This is unfortunate, however ISS is not responsible for the methodology with which vendors release their patches; we simply agreed with them on content and timeframe," ISS argues.

So it's all down to cockup rather than conspiracy, then.

Security Gates

We quizzed Rouland on his views on the relative security of Linux and Windows platforms.

Rouland told us that by platform Linux has twice the vulnerabilities as Windows but this figure is skewed by the huge number of Linux applications coming to market. "There are thousands of new Linux apps which don't have the level of QA older os aps have."

Vulnerabilities in both windows and Linux apps are on the increase. ISS recorded 309 vulnerabilities affecting the Linux platform in the whole of 2001 and 485 such vulnerabilities from the start of this year until September. Similarly, ISS recorded 149 vulnerabilities in Windows applications and operating systems last year but this figure has shot up to 202 for the year to September. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.