LAS VEGAS: The
 security vulnerability reporting, analysis and patching landscape is 
being warped by a set of biases throughout the chain, according to 
researchers.
Steve 
Christey, principal Infosec engineer with MITRE, and Brian Martin of the
 Open Security Foundation said at Black Hat that the chain ranging from 
the researchers to the vendors, to the vulnerability databases that 
classify bugs is clouding the picture for executives and administrators.
Martin said: “People make security decisions, big ones, based on these stats. And that is depressing.”
The 
pair showed how a number of basic biases in human thinking can help to 
create a skewed picture of just how vulnerable a platform can be. For 
example, researchers may focus their efforts onto a single platform or a
 specific type of vulnerability for a short period of time, inflating 
the number of bug reports for one platform while flaws in others may go 
unreported or unnoticed due to lack of attention.
Even 
when the flaws are reported, differences in classification methods can 
help to create a bias in the way flaws are viewed. The researchers noted
 that common platforms, such as the Common Vulnerabilities and Exposures
 (CVE) system, can often classify or present issues in such a way that 
multiple individual flaws will be presented under a single entry and 
considered to be one vulnerability.
Further
 complicating matters can be vendor policies, which dictate how flaws 
are disclosed. While some vendors provide detailed security information 
with their patches, others provide little to no detail, often leaving 
privately disclosed issues completely undocumented.
The 
result, say the pair, is a complex system that will be nearly impossible
 to address with a simple formula. Rather, the researchers believe that 
the databases and groups that report flaws note the limitations in their
 methodology and help to inform administrators as to a flaw's impact on 
specific platforms and versions.
The public, meanwhile, is advised to take security figures with a pinch of salt. “Any time you see someone using stats to say one OS is superior to the other just walk away,” Martin advised. “No vulnerability data set out there can truly cover and answer that question.”
No comments:
Post a Comment