Feeds

ZDI spills beans on 22 zero-day bugs

Vulnerability broker had given software vendors 6 months to fix them ...

High performance access to file storage

The Zero Day Initiative (ZDI) has discussed the existence of unpatched flaws in 22 software applications from vendors including Microsoft, CA, EMC, HP and IBM.

Advisories from the vulnerability broker giving a broad outline of the flaws and suggesting possible workarounds were published on Monday – at least a full six months after vendors were first notified of the flaws – in accordance with ZDI's recently modified disclosure policy.

The HP/TippingPoint organisation, which buys venerability information from security researchers, used to wait until vendors got around to patching bugs before spilling the beans. Six months ago this policy was changed so that vendors were given a deadline of 180 days before ZDI went public over flaws.

ZDI is the most well-known player in the security marketplace that pays researchers for vulnerability findings, normally along with proof-of-exploit code to establish that there is a genuine problem. From that point on, ZDI handles the sometimes protracted process of liaising with vendors as the latter develops and tests security updates.

In the meantime, ZDI adds detection for attacks based on a vulnerability to its range of intrusion-prevention appliances. The 22 newly disclosed, unpatched flaws affect a range of consumer and enterprise technologies including Lotus Notes, HP Data Protector Client and CA ETrust Secure Content Manager, as well as Microsoft PowerPoint and Excel. Most of the flaws involve code injection risks, a class of vulnerability that would normally lead to them getting treated as critical.

In other vulnerability-related news, Adobe and Microsoft both pushed out scheduled security updates on Tuesday.

Redmond's latest monthly patch batch involves 12 bulletins and includes fixes for three outstanding zero-day vulnerabilities. These three previously unpatched (and critical) security vulnerabilities involve Internet Explorer's handling of cascading style sheets, Windows "thumbnail" and the "possible remote code execution on IIS through the FTP service", security service firm Qualys reports.

More details in an overview from the Internet Storm Centre here, or Microsoft's rather less readable version here.

February's patch batch also kills Windows autorun on USB devices, if not CDs and DVDs, as discussed in our earlier story here.

Elsewhere, also on Tuesday, Adobe patched security bugs in Flash Player, Shockwave and Adobe Reader. Sophos has a detailed run-down of the Adobe updates here. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.