Feeds

3Com puts a bounty on vulns

Report security bugs, get paid

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

TippingPoint, a division of networking giant 3Com, plans to pay researchers for information about unannounced vulnerabilities in major systems and software and will add bonuses for prolific flaw finders, the company announced on Monday.

Under the program, dubbed the Zero Day Initiative (ZDI), researchers will submit details of security bugs to 3Com and the company will make offers to become the exclusive owner of the information. The networking giant will use the information to provide early protection to its customers and also work with the affected product's maker to fix the vulnerability.

"Increasingly, an ecosystem is developing around technical security research knowledge concerning as-yet-undisclosed vulnerabilities," the company stated on the ZDI Web site. "We believe that one effective way to capture this data is by establishing a best-of-breed research clearing house and community."

Part bug bounty, part loyalty-rewards program, the Zero Day Initiative refines previous plans started by other companies to reward researchers for exclusive information on vulnerabilities.

Security information provider iDefense, now a subsidiary of VeriSign, established the Vulnerability Contributor Program to offer researchers cash for details about undisclosed flaws. Established in August 2002, the controversial plan has fueled debate on the question of responsible disclosure. Later, additional incentives added cash bonuses to the top contributors every quarter and year as well as rewards for referring other researchers.

The Mozilla Foundation has offered a bounty, but only for serious bugs found in its own open-source browser. Microsoft created perhaps the most famous bounty program in the security industry, but not for bugs. In August 2003, the software giant created a $5m fund to pay for information on attackers that release certain Internet worms and viruses. The bounty is credited with leading authorities to the creator of the Sasser worm, Sven Jaschan, who has been convicted of the crime.

Such programs have become less controversial over time, said Carole Theriault, a security consultant for antivirus firm Sophos.

"Microsoft offered a bounty, and I thought, 'This is Wild West here,' but they got an arrest," she said. "I don't think it is wrong to do. If someone finds something of value, then they should get paid for it."

Under 3Com's program, researchers will sign up for an account on the ZDI's portal site, which will launch on August 15. Vulnerabilities submitted to the company through the portal will be evaluated and the company will then make an offer to the flaw finder. If the researcher accepts the offer, then 3Com will own exclusive rights to the information.

Moreover, 3Com will offer additional awards to prolific bug hunters, granting them silver, gold or platinum status based on how many flaws they find. The company plans to use a point system, reminiscent of frequent flier programs, to track the productivity of researchers.

3Com plans to use flaw information to give its customers early protection against any attacks that might use the vulnerability. The company will obfuscate such updates to make it more difficult for information about the flaw to leak out early.

"No technical details concerning the vulnerability are sent out publicly until the vendor has released a patch," the company stated. "Any protection filters written for submitted vulnerabilities that 3Com distributes to TippingPoint IPS customers are obscured by being described only in very general terms and are encrypted to prevent reverse engineering."

The economic benefit to the creators of such programs may lead to even more companies establishing their own vulnerability-buying programs, Sophos's Theriault said.

"It looks like - at the moment - that individual companies are doing these programs and they are individually paying for the information, but other players in the security industry may join together to pay for vulnerabilities in order to compete."

3Com intends to publicize the new program at the Black Hat Briefings and at the subsequent DEF CON hacker convention, according to an email announcing the Zero Day Initiative. Both events take place in Las Vegas this week.

Copyright © 2004, SecurityFocus logo

Related stories

3Com reports smaller loss as revenues shrink
3Com buys TippingPoint

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Fiendishly complex password app extension ships for iOS 8
Just slip it in, won't hurt a bit, 1Password makers urge devs
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.