Feeds

All bugs are created equal

ISS pledges equal treatment for open source and Windows flaws

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Security tools vendor ISS has promised to handle security vulnerabilities affecting open source and Windows platforms the same way following criticism of its premature disclosure of open source security problems.

In recent months, sections of the security community allege that ISS has jumped the gun in releasing information on flaws within a Solaris font daemon, BIND and (most notably) Apache ahead of the widespread availability of a fix. Critics argue ISS acted out of self-promotion rather than the interests of the wider Internet community.

ISS strongly denies this but admits to mistakes in its approach which it addresses through revised vulnerability disclosure guidelines.

Previously, ISS handled open source vulnerability it unearthed on a "case by case basis" but now it will handle Windows and open source platform the same, normally allowing vendors 30 days to respond to problems before publicising them. ISS' X-Force (security researcher team) guidelines for responsible disclosure contain a four-phase process, which includes the initial discovery phase, vendor notification phase, customer notification phase and public disclosure phase, explained in greater depth here.

ISS is a founding member of the Organisation for Internet Safety (OIS), whose guidelines on disclosing security vulnerabilities are backed by Microsoft. This, together with its handling of various open source vulnerabilities, have cause critics to question ISS' motives.

The issue first arose this summer when ISS included a working patch in the advisory on a bug involving Apache. ISS says it did this "because of the concern over leaks in the open source patching process".

Chris Rouland, director of ISS' X-Force, told us that releasing a patch with the advisory was a mistake which ISS will not repeat again.

"The patch was not well received and from now on we'll let vendor fix problems themselves," he told us.

Part of the problem with ISS' patch was that it dealt with a chunk encoding remote root compromise flaw but not another flaw found by security researcher David Litchfield around the same time.

"We patched the flaw we found, which hackers had already found. The exploit was four months old," Rouland told us.

Further criticisms of ISS' actions came when it released advisories of BIND and Sun daemon bugs ahead of the general availability of patches from vendors. These issues are more easily explained as breakdowns in communication.

In the case of both ISC (BIND) and Sun, both vendors actually edited the ISS advisories prior to release. According to ISS, the release times of these advisories were closely co-ordinated between it and affected vendors.

ISC made a business decision to provide their paying customers patches first, then distributing patches via email, and finally that day, they provided the patches over FTP.

Sun discovered their patches were not functioning properly and was unable to distribute them.

"This is unfortunate, however ISS is not responsible for the methodology with which vendors release their patches; we simply agreed with them on content and timeframe," ISS argues.

So it's all down to cockup rather than conspiracy, then.

Security Gates

We quizzed Rouland on his views on the relative security of Linux and Windows platforms.

Rouland told us that by platform Linux has twice the vulnerabilities as Windows but this figure is skewed by the huge number of Linux applications coming to market. "There are thousands of new Linux apps which don't have the level of QA older os aps have."

Vulnerabilities in both windows and Linux apps are on the increase. ISS recorded 309 vulnerabilities affecting the Linux platform in the whole of 2001 and 485 such vulnerabilities from the start of this year until September. Similarly, ISS recorded 149 vulnerabilities in Windows applications and operating systems last year but this figure has shot up to 202 for the year to September. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.