+ All Categories
Home > Documents > Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999...

Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999...

Date post: 14-Dec-2015
Category:
Upload: shea-lampshire
View: 214 times
Download: 1 times
Share this document with a friend
Popular Tags:
46
Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 [email protected]
Transcript
Page 1: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Vulnerabilities ReportingWhat works, and what doesn’t

Black Hat Briefings, 1999

[email protected]

Page 2: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Outline

• Goals

• Who are the players?

• What do they do?

• What are the problems?

• What works?

• Full Disclosure: The critic’s view

• Full Disclosure: The proponents view

Page 3: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Outline...

• Case studies– Via vendors– Via security vendors– Full Disclosure– Response teams

• What we’ve learned

• What should YOU do?

Page 4: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Goals

• Figure out what the state of vulnerability reporting and disclosure

• Determine the pro’s and con’s of each

• Determine what works and what doesn’t

• Figure out how to use this knowledge to improve your security

Page 5: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

The Players

• Software vendors

• Security vendors

• Emergency response capabilities

• Hackers

• Security Enthusiasts

• Victims

Page 6: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Software Vendors

• What they do– Design and develop software– Sell it to you– Includes all types of software -- OS’s,

network utilities, word processors, etc

Page 7: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Software Vendors...

• What they think of security vulnerabilities– Don’t like them– Don’t want them to be found– Don’t want them to be publicized in the

event they are found– Want them to be quietly fixed

Page 8: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Emergency Response Capabilities

• CERT/CIAC/AUSCERT/FIRST, etc, etc

• Tend to be non-profit, and funded by government, educational, or vendor grants

• Limited budgets

• Tend to be reactionary

Page 9: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Security Vendors

• ISS, NAI, SNI, etc

• Issue advisories on popular software packages

• Spend $$ to find vulnerabilities

• Use media exposure to sell product or services

Page 10: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Security Vendors...

• Work with vendors to a degree– usually give time limitations– will release advisory as soon as patches are

available

Page 11: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

The Hacker

• Wants to break in to your network

• Will typically not report a vulnerability to a vendor

• Might talk too much, give out exploits, and vulnerability will trickle to surface (someday)

Page 12: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Security Enthusiast / Full Disclosure

• Publish vulnerability to security “community” at large

• May or may not contact the vendor, or give long enough time for patch to be developed

• Disclose all details needed to exploit the vulnerability, sometimes even actual exploit

Page 13: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Full Disclosure...

• Embodied in mailing list like Bugtraq, Usenet security groups, NTBugtraq (to a degree)

• Motive is interest/desire to fix problems– Idealistic– Often, motive is personal publicity too

Page 14: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Problems with Issuers

• Each method has good and bad points

• Each has its proponents

• Not all work very effectively

Page 15: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Problems with Security Vendor Initiated Vuln’s

• Profit/Publicity motivated– Typically will use vulnerabilities to their

advantage, marketing wise– May sit on vulnerabilities for marketing

reasons– May cover up their own product

vulnerabilities

Page 16: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Problems with Security Vendor...

• Will sit on vulnerabilities for vendor relations– Usually want to be positively viewed by

vendors– Usually give time for patches

• Time delays lead to exposure– Often, bugs will trickle to the surface

while they’re being worked on

Page 17: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Problems with Security Vendor...

• Rarely release full exploits or details– Hackers usually can figure out the exploits– Average, overworked administrator can’t

Page 18: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Response Teams

• Report on vulnerabilities found in wild, or by others

• VERY slow– Will always work with vendor, to their

schedule– up to 6 months behind current

vulnerabilities

Page 19: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Response Teams…

• Primary function is to alert end users to known problems

• May be too late– 2 days may be too late, 2 months is deadly

Page 20: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Hacker

• Wants to break into your network

• Doesn’t want vulnerabilities fixed

• Doesn’t want you or the vendor to know about the vulnerability

• You never find out

• Tell their friends

• Usually results in big incidents

Page 21: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Security Enthusiast /Full Disclosure

• May give limited time to vendor

• Wants problem solved, but may not wait for an official patch

• Everyone gets the “exploit,” including the hackers

• May create a larger problem where none previously existed.

Page 22: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Full Disclosure: Why it’s Good

• Levels the playing ground– Everyone finds out about the vulnerability– Workarounds and temporary fixes are

almost always available, and are discussed.

• Vulnerabilities are exposed quickly– Prevents holes from being quietly

exploited– Allows for quick fixes

Page 23: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Full Disclosure: Why it’s Good...

• Large percentage of vulnerabilities caught prior to them being a problem– In any given week, as many as 15 new

vulnerabilities are exposed in forums like Bugtraq

• Keeps pressure on vendors– Many attribute full disclosure to new

proactivity on the part of some vendors

Page 24: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Full Disclosure: Why it’s good...

• Discussion of program flaws has led to better programming– No longer are there dozens of buffer

overruns being exposed every week– Same old mistakes aren’t being made– Introduction by many vendors of safer

versions of functions• snprintf()

Page 25: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Full Disclosure...

• Vulnerabilities get the publicity they need

Page 26: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Full Disclosure: What the critics say

• Full disclosure creates problems where they otherwise didn’t exist– Vulnerabilities always exist– Never assume they aren’t already in the

wrong hands• Vulnerabilities may exist in the wild even

prior to their disclosure– Irix buffer overruns

Page 27: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Full Disclosure: What the critics...

• Full disclosure amounts to little more than hackers legitimizing their exploit trading– Large % of those involved in full

disclosure are security professionals– Many are system administrators merely

trying to help others

Page 28: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

What the critics say...

• Working with vendors is the quickest and best way to get things done– Vendors *have* to be slow

• Release cycles

• testing

• regression

– Usually try to limit disclosure of bug

Page 29: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Case Studies

• Through Vendors– Sun SNMP– Sun getpwnam() vulnerability

• Through vendor, via Security Vendor– Microsoft SNMP

Page 30: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Case Studies...

• Full Disclosure– eEye IIS Vulnerability

• Response Teams– Various

Page 31: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Through Vendors

• Sun SNMP vulnerabilities– Found and documented vulnerabilities in

April, 1998.– Allowed for remote users to gain local and

remote root access via undocumented, and non-removable community name

– Full details forwarded to Sun– Agreed to not publicize, allow Sun to

quietly fix in Solaris 7, and issue patches

Page 32: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Sun SNMP...

• What worked:– Vulnerabilities weren’t used in the wild– Solaris 7 was not vulnerable– Patches were issued

• What didn’t work– Fix took over 4 months to reach users, as

did news of the vulnerability– Patch was insufficient

Page 33: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Sun Solaris getpwnam()

• Vulnerability discovered in November, 1996

• allowed for local and remote root access

• Sun was informed, and given exploit

• Vulnerability was quietly fixed in a libc patch, 6 months later

Page 34: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Getpwnam()...

• What worked– Limited public exposure

• What didn’t work– Vulnerability was never publicized– Remained in wild for 6 months– Dozens of machines still vulnerable– Known in the “underground”

Page 35: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Via Security Vendor: Microsoft NT SNMP Agent

• Vulnerabilities discovered January, 1998

• MS reported immediately

• Work “began” to address the problem

• Advisory released by NAI in October, 1998

• Fix available in Service Pack 4

Page 36: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Microsoft SNMP agent...

• What worked– Patch was issued prior to widespread

problems

• What didn’t work– SP4 default setting for SNMP still allowed

for problems– SNMP fix was not a publicized part of SP4– Patch took 9 months

Page 37: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Full Disclosure: IIS Buffer Overflow

• eEye releases advisory to Bugtraq, June 15 1999

• Microsoft given 1 week prior notice

• Full exploit details released

• Workaround supplied

• Official patch/hotfix available within a couple of days

Page 38: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

MS IIS Overflow...

• What worked:– Vulnerability got extensive media

coverage• ZDNet, Associated Press, Forbes, Wired...

– Patches quickly available

• What didn’t work– Machines that may have been otherwise

been ignored may have been attacked

Page 39: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Response Teams

• Not usually finding new vulnerabilities

• Days of 6 month delays are gone

• Still don’t issue advisories until vulnerability is already public, and patched.

Page 40: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Affects of Full Disclosure

• Vendors attempting to be proactive– Sun fixes numerous bugs in Solaris 7– MS fixing flaws in network security model

• Response Teams acting quicker

• OS’s getting more secure– Well, maybe not just yet...

Page 41: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Lessons to be learned

• Vendors tend to be slow unless the proverbial cat is out of the bad

• Hackers have the exploits

• Ignorance is *not* bliss when it comes to security

• Better to know and have to work around than to not know at all

Page 42: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

What You Can Do

• Mailing Lists– Bugtraq

• Full Disclosure

• Covers all varieties of operating systems, network appliances, firewalls, etc

• http://www.securityfocus.com

– NTBugtraq• Pretty much full disclosure

• Covers only the Microsoft NT OS and apps

• http://www.ntbugtraq.com

Page 43: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

What to do...

• Lists continued…– Incidents Mailing list

• Covers breaking threats and incidents

• http://www.securityfocus.com

– InfoSec News• Covers security related news

[email protected]

Page 44: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

What to do...

• Summary lists– ISS

• Summarizes previous 2 week’s vulnerabilities

• http://xforce.iss.net/mailinglists

– Microsoft Security• Publishes security information from Microsoft on

security issues

[email protected]

– (Just about every vendor has a list)

Page 45: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Summary

• Vendor’s tend to hush security issues

• Security vendor advisories work, but have limitations

• Full Disclosure is the best way to know what’s going on prior to it becoming an issue

Page 46: Vulnerabilities Reporting What works, and what doesn’t Black Hat Briefings, 1999 jrauch@securityfocus.com.

Questions?

[email protected]


Recommended