Bugtraq mailing list archives

RE: Internet Explorer 0day exploit


From: "Ken Kousky" <kkousky () ip3inc com>
Date: Sat, 21 Jul 2007 11:22:00 -0400

Zero day is a serious misnomer from vendors that suggest that the counting
of time an exposure is known BY THE GOOD GUYS is some kind of trigger date
when in reality, many serious exploits are know BY THE BAD GUYS so the day
zero is really months or maybe years prior to the disclosure or notification
date. Look at the WMF vulnerability that caused a mad rush to patch it once
the good guys were put on notice. In this case, the vulnerability had been
present in Windows products since the early 90s and according to Kapersky
Labs there was even malware being sold that took advantage of it long before
there was even day zero notification.

So, I'd say that day zero is hype and misleading in that it takes us away
from the reality that EVERY PATCH fixes an exposure that existed from the
time the software was deployed and NOT from the day of reporting or
disclosure. Maybe if we tracked day zero as the installation day of the
faulty code we'd all have a better understanding of how untrustworthy our
base of COTS products really are!

KWK

-----Original Message-----
From: Chad Perrin [mailto:perrin () apotheon com] 
Sent: Friday, July 20, 2007 5:09 PM
To: bugtraq () securityfocus com
Subject: Re: Internet Explorer 0day exploit

On Wed, Jul 18, 2007 at 10:12:11PM +0200, Chris Stromblad wrote:

Zow Terry Brugger wrote:
What exactly constitutes a 0day? From my perspective naming a
vulnerability 0day have absolutely no value whatsoever, it just doesn't
make any sense. 0day for who? The person who release it, sure, but for
the security community as a whole... nah.

I consider a "0day" to be a vulnerability for which there is an exploit
in 
the wild before there's a vendor patch for the problem. If this
convention is 
followed, it has value to the community, because we know that having
that 
software on our systems presents a significant risk.

Fair point, had not considered that before. It would be better to just
call it active vulnerability vs inactive vulnerability. Active would
define something that yet cannot be prevented and has "wild" exploit
code where a passive vulnerability is something that has been patched
and _should_ no longer be applicable. Anyways, you make a good point.

Shouldn't that distinction be simply marked by the terms "patched" and
"unpatched"?

My understanding of the term "zero day exploit" is that it refers to a
vulnerability for which there is an exploit "in the wild" or known
publicly, concurrent with knowledge of the vulnerability itself.  Thus,
the exploit is out there on "day zero".

The term "zero day vulnerability" just seems to be an error of phrasing,
where "vulnerability" replaces "exploit", and as a result confusion such
as in this discussion arises.  Of course, I'm not "in charge" of
maintaining these terms' meaning, so I imagine my opinion of the matter
won't count for much.



One more thing about "advisories". I think it would be better to
release
them immediately and let people know what they are facing. With public
dissemination of a vulnerability perhaps someone will release a 3rd
party patch or another inventive way of protecting oneself. Holding it
"secret" really doesn't help anyone. If anything it prevents people
from
 trying to find a way to fix the vulnerability.

First off, I don't think anyone can seriously say it doesn't help
_anybody_ 
-- it certainly helps the vendor. If it's an IDS/IPS company that holds
the 
research and they've got a signature out for it on their system, it
certainly 
helps them. Here we find a variation on the ancient (in Internet terms) 
argument about full disclosure: if bugs are public knowledge, will
vendors be 
more responsive to fixing them? I don't think you're going to see
publicly 
developed patches for any but the most extreme cases. At the same time,
I see 
some advisories where the vendor was notified more than six months ago
and 
just has a patch out now. That's a pretty large window of vulnerability
if 
anyone malicious knows about the problem (and if we're finding them in
the 
open community, there's no reason they wouldn't). I think security 
researchers need to continue to think about exuding due pressure on
vendors 
to get bugs patched.

Yes it sure helps the vendor, but it certainly doesn't help the end
user/customer and in my opinion it is he who matters. The vendor has a
responsibility towards the consumer, not the other way around. By not
exerting any pressure on vendors, I believe things will never change. It
certainly doesn't make any sense for a vendor to become proactive in
making their software more secure. At least not until enough people
start demanding more secure software...

It looks like the two of you are in violent agreement.

-- 
CCD CopyWrite Chad Perrin [ http://ccd.apotheon.org ]
John Kenneth Galbraith: "If all else fails, immortality can always be
assured through spectacular error."


Current thread: