The Web's 20 Worst Security Flaws 214
XsynackX writes "The SANS Institute released its Top-20 list of the biggest vulnerabilities on the web today. The SANS Top 20 Internet Security Vulnerabilities list is actually a compilation of two lists--the top 10 Windows vulnerabilities and the top 10 Unix vulnerabilities. The list goes into almost more detail than any one person could ever take in on individual security flaws, but provides a wealth of knowledge for those who like to get in-depth. Interestingly enough, the browser section of the Windows vulnerabilities lists everyone's favorite browser Internet Explorer with 15 flaws and Mozilla with only 7."
not just "the web" (Score:5, Informative)
They include things like week passwords and non-web network threats.
I can't see the site (Score:2, Funny)
Re:not just "the web" (Score:2, Funny)
Re:not just "the web" (Score:5, Funny)
Re:not just "the web" (Score:5, Funny)
Re:not just "the web" (Score:5, Funny)
That's precisely why you should stick it to the monitor - nobody will find it because they will be busy looking under the keyboard! Cunning, eh?
Re:not just "the web" (Score:3, Interesting)
Better pick a good password and hang onto it for a while so you can remember it.
Sigh (Score:2)
Re:Sigh (Score:2)
Re:Sigh (Score:2)
Re:not just "the web" (Score:3, Interesting)
I know a guy who used to be a computer tech...
Whenever a windows 98 machine would come in for a wipe-and-reload, it was fairly standard policy that, if the end user didn't have the key with them, but it was obvious that they had a copy of windows on the machine, my friend would use another windows98 key - they all work anyway, and there's no activation.
So, after doing the install 40,000 times, he had the key memorized, and used it as his password.
There's nothing like seeing someone type 25 random charact
Re:not just "the web" (Score:2)
http://homestar.sytes.net/cgi-bin/passgen
I typically rotate my passwords when I have to get my iBook fixed-- about every 6 months. I love the looks on their faces when I tell them my password.
Re:not just "the web" (Score:2)
Re:not just "the web" (Score:2)
Re:not just "the web" (Score:2)
I just love web-based password generators...
Re:not just "the web" (Score:5, Insightful)
Certainly some attacks take longer, but in general, if they have your machine, its too late for security!
Re:not just "the web" (Score:2)
Yeah. Give someone access to the physical computer with an extra hard disk, or a jump drive, and there's very little that you can do. The only thing, I imagine, is setting a bios password.
Now, one of my buddies had a Compaq laptop which had a bios password that he didn't know. He drained the CMOS battery, in hopes of resetting the password. This had the effect of breaking the whole thing. He called Compaq, and they said that he'd have to replace the motherboard.
Now, if you can implement security like
Re:not just "the web" (Score:2)
I had to bypass one the other day - you just unplug the computer, move the jumper into the 'CLEAR CMOS' position - if you have trouble finding it, it should be near the battery, or at least they are on every computer I've done it on.
Re:not just "the web" (Score:2)
Most desktops have a jumper you can get to, but most cases have the option to be padlocked shut. Again, if someone has physical access and no restriction on what they can do to it, there i
Re:not just "the web" (Score:2)
Re:not just "the web" (Score:2)
Granted, I go through a lot of hard drives.
Re:not just "the web" (Score:2)
Re:not just "the web" (Score:2)
Funny (Score:3, Informative)
Great pun, but seriously, this reminds me of one story. There was a web-based service to conveniently change personal pages of people working in the lab (photo, bio, links to projects) where everyone were usually logged-in
Re:Funny (Score:2)
Simple (Score:2)
It wasn't sent over SSL but of course it wasn't a simple:
Set-Cookie: LOGGED_USER=name; ...
but instead included enough information about the client encrypted and signed by the server that simply sending the same data by anyone else wouldn't work.
As an example please consider this simplified idea: the server verifies the password during the login and has
Re:not just "the web" (Score:2)
But how do you know that this password hasn't been compromised? What if you used it when you signed up for the InnocentHobbyAndNotEvilHackers.org newsletter? And is this password (or a close variant) the same as the password and email address you use at BigCorporateBank.com?
Passwords don't stand up and shout "I've been compromised!" when a bad guy learns them. Expiring password
Firefox vulnerabilities IE vulnerabilities (Score:4, Interesting)
Re:Firefox vulnerabilities < IE vulnerabilities (Score:1)
Re:Firefox vulnerabilities IE vulnerabilities (Score:3, Insightful)
Re:Firefox vulnerabilities IE vulnerabilities (Score:2, Insightful)
Shows what I know.
Re:Firefox vulnerabilities IE vulnerabilities (Score:2)
Re:Firefox vulnerabilities IE vulnerabilities (Score:2, Interesting)
That's why they jump on anything that looks like it might be taking off. IE: their own music store, game console, etc.
Re:Firefox vulnerabilities IE vulnerabilities (Score:2, Insightful)
This thread is veering way off topic, and I realize this, but there are a couple of important issues here that need to be addressed. (Please don't mod me down. :)
1) Firefox is about as secure and obscure as any of the less. There are a multitude of different browsers out there now, and undeniably companies like Espial and Opera have lost a lot of ground to the popularity of Firefox. Hackers have the implicit goal of doing something because they can. Exploiting holes in a piece of software starts as a "I
Re:Firefox vulnerabilities IE vulnerabilities (Score:2)
Re:Firefox vulnerabilities IE vulnerabilities (Score:2)
Be went out of business because no-one bought their OS. One of the main reasons no-one bought their OS was because it never made it out of beta.
Re:Firefox vulnerabilities IE vulnerabilities (Score:2)
Re:Firefox vulnerabilities IE vulnerabilities (Score:4, Insightful)
1. They wove IE into the OS for political reasons, and it's probably impractical to extract it.
2. XUL is threatening what Netscape once threatened, namely getting rid of the applications barrier to entry that preserves the OS monopoly.
3. MS can't be perceived as ever having lost. The image of the invincible monolith must be preserved.
Re:Firefox vulnerabilities IE vulnerabilities (Score:2, Insightful)
Unfortunately, not all Firefox vulnerabilities are known to all, and nor are they fixed "quickly".
In cases where the bug is made public, this is true. For cases where they sweep the bug in the rug and keep it from showing publicly in the bug database while they argue amongst themselves if they're really going to fix it
Re:Firefox vulnerabilities INSIDER KNOWLEDGE??? (Score:2)
Only 7? (Score:5, Interesting)
Err... at this point, does it really matter? It's useful to compare BIND against djbdns (many security flaws vs. none), or Linux against OpenBSD (many security flaws vs. one remote hole in 8 years), but 15 flaws vs. 7 flaws? To me, that just says that both browsers are horribly insecure, and slightly more effort has been put into finding flaws in MSIE.
Re:Only 7? (Score:3, Informative)
Add open ssh, your ftp daemon of choice, apache etc and the amount holes look about the same as Linux. Both OSs do, after all, run mostly the same software.
Comparing MSIE vs Mozilla is useful, as both do the same job and are exposed to the internet in the same way.
Re:Only 7? (Score:5, Informative)
The forked Apache in OpenBSD is much more secure than any you'd find elsewhere. On top of all the patches rejected by the Apache people for various reasons and thus not distributed to anyone else, it benefits from W^X protection (on i386, which no one else has) and ProPolice (it's not that widely used, some of the userspace stuff in Linux seems to use it but the kernel doesn't). This has turned a bunch of arbitrary code exploits into DOSs, which merely crash the server process.
The ftpd in the base install as well as everything else benefits from W^X and ProPolice. W^X is handled by the system, and ProPolice is used by default on anything you compile. Therefore, unless you work pretty hard to avoid it, anything that's run on OpenBSD benefits from the added protection. As a result, it's more secure because exploits aren't always exploitable on the platform.
DOS issues are still patched, but the difference is that they're not exploitable before the patch is issued.
Re:Only 7? (Score:2)
That depends on what you're doing with it. If you're running a system where you have to let people in for them to do what's needed, access controls are probably the way to go (on Linux or other OS).
If you want a server that does generic serving or firewalling, OpenBSD is the way to go because it is more resistant to exploits of any kind, and the ser
Re:Only 7? (Score:2)
Re:Only 7? (Score:5, Informative)
A matter of attitude? (Score:4, Insightful)
But the Criminal Monopoly simply don't care either about other people's security, or about their browser, which was only intended to kill Netscape. As that has been more or less accomplished, they are simply not interested any more. What is more, in common with other Monopoly products, the underlying codebase has probably become such a mess that it would be better to throw it away and start again, but the paranoid megalomaniac Bill would have too many tantrums if someone was brave enough to tell him the truth.
I guess you could say... (Score:2)
Re:Only 7? (Score:3, Informative)
Re:Only 7? (Score:2)
In this case, it reduced the number of security holes to patch from 15 to 7. I.e. Mozilla needs to be patched to cover up MS Windows security holes half as often as does IE.
Switching from IE to Mozilla does make one's system more secure. The fact that switching from MS Windows to a unix based system will have a greater effect on security should not keep people who are using MS Windows from swapping browsers.
Their web server... (Score:5, Funny)
Hrm. statistics speak for themselves. (Score:3, Funny)
Unix with 5% also has 10 of the top 20 vulnerabilities.
I think the stats speak for themselves in which is more secure. If Win boxes can take such a phenomenal market share and still only have the same number of 'top' vulnerabilities, that's putting it 19 times more secure.
Re:Hrm. statistics speak for themselves. (Score:2, Informative)
Erm no. (Score:2, Insightful)
I think the stats speak for themselves in which is more secure. If Win boxes can take such a phenomenal market share and still only have the same number of 'top' vulnerabilities, that's putting it 19 times more secure. From the summary:
"The SANS Top 20 Internet Security Vulnerabilities list is actually a compilation of two lists--the top 10 Windows vulnerabilities and the top 10 Unix vulnerabi
Re:Erm no. (Score:3, Funny)
Re:Hrm. statistics speak for themselves. (Score:1)
You were going for the Funny mod, right? (Score:4, Insightful)
The article separately lists the top 10 Windows and top 10 Unix vulnerabilities. In this case, Top 10 plus Top 10 does not necessarily equal Top 20.
Sort of like if you considered the Top 10 fastest race cars at a Nascar race and the Top 10 fastest race cars at a soapbox derby race - the resulting list wouldn't be the Top 20 fastest race cars.
Re:Hrm. statistics speak for themselves. (Score:2)
Ok I'm sure I'll get slammed for this but... (Score:4, Insightful)
Re:Ok I'm sure I'll get slammed for this but... (Score:5, Funny)
Yes, because it makes our penises feel bigger.
Re:Ok I'm sure I'll get slammed for this but... (Score:2)
Re:Ok I'm sure I'll get slammed for this but... (Score:2)
Re:Ok I'm sure I'll get slammed for this but... (Score:2, Insightful)
In my oppion (Score:4, Insightful)
Re:In my oppion (Score:5, Informative)
This was fixed by the mozilla dev team's implementation of a XPI installer website whitelist consisting of (by default) just mozdev.org. The user can add other sites though, should they want to.
Re:In my oppion (Score:2)
Re:In my oppion (Score:2)
Re:In my oppion (Score:2)
Wow! Tell the BIND guys that quick!
Re:In my oppion (Score:2)
Re:In my oppion (Score:5, Interesting)
Firefox does not allow extensions to be installed from another web site besides update.mozilla.org by default. The user must specify in the options that it wants to allow extensions from a certain site to be installed, which should keep spyware low for now. Firefox users also have more computer skills than IE users. Firefox holes are filled faster than IE. All this should keep spyware low on the Mozilla platform.
PS: I believe that a recently passed bill made spyware illegal with the penality of prison, and I think that I saw on Google news something about the first spyware trial.
7 is not `only' (Score:5, Insightful)
Interestingly enough, the browser section of the Windows vulnerabilities lists everyone's favorite browser Internet Explorer with 15 flaws and Mozilla with only 7.
Don't think I'm trolling but this is like saying the USA has 27,000 nuclear weapons whereas Russia has only 13,000.
Re:7 is not `only' (Score:2)
That was my initial thought, too.
Then I thought, why the hell am I trying to see meaning in statistics quoted on the Slashdot front page? It would be more meaningful to flip a coin to decide which is more secure.
You'd have to actually RTFA and think about it for a while before coming to any kind of sensible conclusion. That said, past experience has me biased in favour of mozilla...
Re:7 is not `only' (Score:5, Insightful)
Still, I agree with the parent - this is an AvP situation. Whoever 'wins' with the least problems, we still lose.
Re:7 is not `only' (Score:5, Insightful)
Not only do the Mozilla vulnerabilities not actually allow much of an attack, but they've all been fixed in the latest versions of the browser.
This is not true on the Windows side, as Secunia recommends disabling or switching browsers to deal with a lot of the bugs.
Re:7 is not `only' (Score:3, Insightful)
The shell: vulnerability is a perfect example of this. Mozilla didn't fix anything. They simply decided that the shell: protocol was so incredibly insecure that they would disable it entirely. IE is still vulnerable, as the protocol still sucks. No
That should be... (Score:5, Insightful)
1. A fool with root access.
What about threats to Mac OS X? (Score:3, Interesting)
Re:What about threats to Mac OS X? (Score:2, Funny)
Generally, with automatic update turned on, and the ocasional glance at the Apple section on /., you should be fine.
I feel safe (Score:1)
Why is OpenSSL mentioned for unix and not windows? (Score:1, Informative)
More One Liners (Score:1)
2) I suppose it can't be more than 5 'cause it has to make room for Windows 2003
3) Where's Didio of yankem grope to tell us all that those *nix flaws are really SCO Unix flaws that they've copied over?
4) FLAWS? I'm all for FLOSS -- ask Perens!
5) ESR waves hand -- "These are not the ports you're looking for."
6) Security Flaws? Ha! Here in Redmond, we call it Innovation(TM) Why do you think we call it Trashwor...um, Trustworthy Computing?
IE is #1 browser (Score:1)
P2P??? (Score:3, Interesting)
Re:P2P??? (Score:2)
Only if people with sledgehammers are as common as P2P use in MS Windows. This isn't a listing of default install vulnerabilities. This is a list of the most likely reasons for a system to get cracked. Apparently idiot installing P2P software is the 7th most common reason for a MS Windows box to get cracked. I doubt that DOS via sledgehammer appears very high among crack causes.
Re:P2P??? (Score:2)
Re:P2P??? (Score:2)
The main reason that businesses should keep P2P software off their machines is that it makes them vulnerable to lawsuits by copyright holders (the legal exploit). *All* P2P programs are vulnerable to that and the spoofed content (social) exploit. The technical exploits (which are program specific) are much less serious in comparison.
This is not a technical article. They aren't giving prizes to the best exploits.
Re:P2P??? (Score:2, Informative)
Re:P2P??? (Score:2)
Yep, Unix is vulnerable. It's all a matter of degree of what it takes to smash it. Vulnerability is not a yes-no thingee. It's all a matter of degree.
Only? (Score:5, Interesting)
I don't think security flaws in something as commonly used as a web browser should ever be noted as "only" a certain number. Sure Mozilla beat IE, but the point still remains that it had 7 too many. I'll have to read this list when I get a chance and see how many of those were really windows issues and mozilla just passed the data on.
(And yes I know you'll never have bug free software)
Re:Only? (Score:2)
The Entire 56 page report. (Score:3, Informative)
http://files.sans.org/top20.pdf [sans.org] (351KB)
Windows + Linux (Score:3, Funny)
Re:Windows + Linux (Score:2)
NetBIOS protection -- close port 445 (Score:3, Interesting)
Re:NetBIOS protection -- close port 445 (Score:2)
Interesting quote from the article (Score:2, Interesting)
Re:Interesting quote from the article (Score:2)
In fact Microsoft's latest security hole [microsoft.com] requires IIS5 or IIS6.
Really? (Score:2)
U3. Authentication (Score:2)
Greatest security flaws... (Score:2)