Original URL: http://www.theregister.co.uk/2004/10/11/sans_top_20/
The IT security vuln league table of fear
Top 20 threats to humanity
A list of the worst 20 security vulnerabilities bedevilling Windows and *Nix systems was unveiled last Friday by the SANS (SysAdmin, Audit, Network, Security) Institute.
The list, now in its fifth year, is designed to help admins to prioritise their efforts so that they can close the most dangerous security holes first. It highlights the top 10 Windows and top 10 Unix issues in their relative order of importance. The roll of infamy is decided by a panel of IT security industry reps, academics, users organisations and the SANS Institute.
Top Vulnerabilities to Windows Systems
- Web servers & services
- Workstation service
- Windows remote access services
- Microsoft SQL Server
- Windows authentication
- Web browsers
- File-sharing applications
- Window’s Local Security Authority Subsystem Service risks
- Mail client
- Instant messaging
Top Vulnerabilities in Unix and Linux Systems
- BIND Domain Name System
- Web server
- Version control systems
- Mail transport service
- Simple Network Management Protocol (SNMP)
- Open Secure Sockets Layer (SSL)
- Misconfiguration of Enterprise Services NIS/NFS
As with previous years the list is fairly general and will generate few surprises among security pros. Despite this the vulnerabilities it recounts are frequently ignored. These ommissions are a key factor in the spread of destructive worms. SANS line is that simple precautions, prompted by raised awareness, can save far greater problems further down the line.
In a statement SANS said: "The vast majority of worms and other successful cyber attacks are made possible by vulnerabilities in a small number of common operating system services. Attackers are opportunistic. They take the easiest and most convenient route and exploit the best-known flaws with the most effective and widely available attack tools. They count on organizations not fixing the problems, and they often attack indiscriminately, scanning the Internet for any vulnerable systems. The easy and destructive spread of worms, such as Blaster, Slammer, and Code Red, can be traced directly to exploitation of unpatched vulnerabilities."
"Although there are thousands of security incidents each year affecting these operating systems, the overwhelming majority of successful attacks target one or more of these twenty vulnerable services," it added. ®