Panel probes the half-life of bugs

Predictable decay rate

  • alert
  • submit to reddit

Build a business case: developing custom apps

Software security holes never die, they fade from the Internet at a rate of 50% every thirty days after a patch is released, according to the results of a study released at the Black Hat Briefings security conference here Wednesday.

Researchers at the California-based security company Qualys analyzed the results of 1.5 million vulnerability scans conducted since January 2002 by the company's free and commercial vulnerability scanning services. The results put some statistics behind what security pros and hackers have known anecdotally for years: new vulnerability announcements tend to kick off a kind of festival of hacking, in which anyone who gets their hands on an exploit can have their way with innumerable systems around the world, as companies and individuals slowly adopt the fix.

Currently in that hacker sweet spot is the Microsoft Windows DCOM RPC hole announced July 16th. Using exploits that have already been released to public mailing lists, and others being swapped privately in IRC, anyone with the inclination can tap into computers running most versions of Windows, if the target system hasn't been patched and isn't behind a firewall.

According to Qualys' analysis, the RPC vulnerability is now the most prevalent on the Internet.

By an odd quirk, some bugs violate the 30-day half-life rule and actually start growing in prevalence about 90-days into their lifecycle, said Qualys CTO Gerhard Echelbeck, presenting the research in a panel discussion. "There are a number of vulnerabilities that come back." Echelbeck attributes this bug-immortality to network administrators cloning new systems from old, unpatched images.

The researchers also found that 80% of exploits are released within 60 days of a vulnerability's announcement.

"This work on the statistics validates what we've always considered to be a rule of thumb," said Black Hat organizer Jeff Moss.

Disclosure Debate
Security researcher Mark Loveless, also on the panel, said the computer underground knows well how to take advantage of the opportunities presented by the patching curve. "There's a lot of awareness already in the underground culture, and they have already been ramping up their efforts to a large extent, because they know they have a very short window in which to work," said Loveless. "There are people who work extremely fast at this"

Software vulnerabilities are emerging as the unofficial theme of this year's Black Hat Briefings. Wednesday morning the Organization for Internet Safety held a panel discussion on its official guidelines for vulnerability reporting and response, released Monday. The guidelines would give vendors at least 30 days to produce a patch for a vulnerability before a bug-finder goes public with it. The bug-finders would then withhold exploit code and technical details for another 30 days after the advisory.

Chris Wysopal, research director for @stake and an author of the guidelines, said full and immediate public disclosure of security holes was once the only way to get vendors to plug them, but that today the practice does more harm than good.

"The environment has changed in the last seven to ten years, when the Full Disclosure movement started," said Wysopal. "The vendors at that point weren't really communicating with anybody who wasn't a big customer, and didn't have any process at all for dealing with security issues.

"Things don't work that way now," said Wysopal. "At some point vendors started to realize that they had to take this stuff seriously"

Some audience members were skeptical, and charged that the guidelines were aimed at increasing the value of early-notification services that some security companies provide, in which paying customers get early access to vulnerability data under a confidentiality agreement. The guidelines neither block nor encourage the practice.

Others worried that vendors would use the guidelines to delay fixing security holes. Scott Culp, security manager at Microsoft, an OIS founding member, countered that the guidelines would actually put software-makers' feet to the fire, because it mandates that vendors give bug-finders regular updates on their progress in patching a bug. "From a vendor perspective, these guidelines don't let us off the hook," said Culp. "Far from it."

Much of the talk at the conference has focused on the Windows DCOM RPC hole, which many expect to be the target of an Internet worm in the days or weeks to come.

The hole affects most versions of Windows, including Windows Server 2003, which ostensibly had been the subject of an intensive pre-release code review as part of Microsoft's 18-month-old "Trustworthy Computing" security initiative.

In congressional testimony last week, Microsoft chief security strategist Scott Charney told lawmakers that the company had spent $200 million trying to make Windows Server 2003 secure. In a prepared statement, he called the new bug "disappointing," but offered little hope that it wouldn't happen again. "Such occurrences are part of major operating system development," said Charney. "These systems -- in all platforms, including Windows, Linux, and Unix -- will always suffer vulnerabilities."

© SecurityFocus logo

The essential guide to IT transformation

More from The Register

next story
Rupert Murdoch says Google is worse than the NSA
Mr Burns vs. The Chocolate Factory, round three!
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Know what Ferguson city needs right now? It's not Anonymous doxing random people
U-turn on vow to identify killer cop after fingering wrong bloke
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
prev story


Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.