The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service...

40
The Laws of Vulnerabilities The Laws of Vulnerabilities Terry Ramos Qualys 02/15/06 - HT1-202 Terry Ramos Qualys 02/15/06 - HT1-202

Transcript of The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service...

Page 1: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

The Laws of VulnerabilitiesThe Laws of Vulnerabilities

Terry RamosQualys

02/15/06 - HT1-202

Terry RamosQualys

02/15/06 - HT1-202

Page 2: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Are We Getting Better or Worse ?

What is a vulnerability?

How significant is this vulnerability?

How prevalent is this vulnerability?

How easy is this vulnerability to exploit?

Are any of my systems affected by this vulnerability?

How quickly should I patch this vulnerability?

Page 3: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Security Trend Indicators

•Malicious Code (↑)

•Vulnerabilities (↑)

•Spam and Spyware (↑)

•Phishing and Identity Theft (↑)

….and

•Time to Exploitation (↓)

Page 4: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

First Generation Threats

•Spreading mostly via email, file-sharing

•Human Action Required

•Virus-type spreading / No vulnerabilities

•Examples: Melissa Macro Virus, LoveLetterVBScript Worm

•Replicates to other recipients

•Discovery/Removal: Antivirus

Page 5: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Second Generation Threats

•Active worms

•Leveraging known vulnerabilities

•Low level of sophistication in spreading strategy (i.e. randomly)

•Non Destructive Payloads

•Remedy: Identify and Fix Vulnerabilities

Page 6: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Third Generation Threats

• Automated Attacks Leveraging Known and Unknown Vulnerabilities

• Collaboration of Social Engineering and Automated Attacks

• Multiple Attack Vectors— Email, Web, IM, Vulnerabilities,…

• Active Payloads

• Remedy: Security Enforcement / NAC / NAM

Page 7: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

The Laws of Vulnerabilities: Studying Vulnerabilities and Patching

• Objective: Understanding prevalence of critical vulnerabilities over time in real world

• Timeframe: 2002 - Ongoing

• Data Source: — 70% Global Enterprise networks

— 30 % Random trials

• Methodology: Automatic Data collection with statistical data only – no possible correlation to individual user or systems

• Scanning: Agentless/Remote

Page 8: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

0

1

2

3

4

5

6

7

8

Q402 Q103 Q203 Q303 Q403 Q104 Q204 Q304 Q404 Q105 Q205 Q305

Millions

Internal/Intranet ScansExternal/Perimeter Scans

Analyzing 32,000,000 Vulnerability Scans

BlasterWorm

WittyWorm

ZotobWorm

SlammerWorm

SasserWorm

Page 9: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Raw Results

• Largest collection of global real-world vulnerability data:

—32,147,000 IP-Scans from Q3/2002 to Q3/2005—21,347,000 critical vulnerabilities identified

• Scope of Vulnerabilities included—1,060 out of 1,556 unique critical* vulnerabilities

* Providing an attacker the ability to gain full control of the system,and/or leakage of highly sensitive information. For example, vulnerabilities may enable full read and/or write access to files, remote execution of commands, and the presence of backdoors.

Page 10: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

The Changing Vulnerability Landscape

• From server to client applications

• Before: Vulnerabilities in server applications:— Webserver, Mailserver, Operating System services,

• Now: More than 60% of new critical vulnerabilities in client applications: — Web Browser, Backup Software, Media Player, Antivirus

Software, Flash, …

Page 11: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

0%

20%

40%

60%

80%

100%

120%

10/5

/200

2

12/5

/200

2

2/5/

2003

4/5/

2003

6/5/

2003

8/5/

2003

10/5

/200

3

12/5

/200

3

2/5/

2004

4/5/

2004

6/5/

2004

8/5/

2004

10/5

/200

4

12/5

/200

4

2/5/

2005

4/5/

2005

6/5/

2005

8/5/

2005

WebDAV Buffer Overflow

Microsoft WebDAV Vulnerability

Microsoft Windows 2000 IIS WebDAV Buffer

Overflow Vulnerability

CAN-2003-0109Qualys ID 86479

Released: March 2003

Microsoft Windows 2000 IIS WebDAV Buffer

Overflow Vulnerability

CAN-2003-0109Qualys ID 86479

Released: March 2003

Page 12: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

0%

20%

40%

60%

80%

100%

120%

10/5

/200

2

12/5

/200

2

2/5/

2003

4/5/

2003

6/5/

2003

8/5/

2003

10/5

/200

3

12/5

/200

3

2/5/

2004

4/5/

2004

6/5/

2004

8/5/

2004

10/5

/200

4

12/5

/200

4

2/5/

2005

4/5/

2005

6/5/

2005

8/5/

2005

Microsoft LSASS

Buffer Overflow in Microsoft Local SecurityAuthority Subsystem Service (LSASS)

Buffer overflow in Microsoft Local Security Authority

Subsystem Service (LSASS)

CAN-2003-0533Qualys ID 90108

Released: April 2004

Buffer overflow in Microsoft Local Security Authority

Subsystem Service (LSASS)

CAN-2003-0533Qualys ID 90108

Released: April 2004

Page 13: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Vulnerability Half-Life

19 days

25%

50%

75%

100%

38 days 57 days 76 days 95 days

For a critical vulnerabilityevery 19 days the number

of vulnerable systems is reduced by 50% on external systems

For a critical vulnerabilityevery 19 days the number

of vulnerable systems is reduced by 50% on external systems

114 days

Page 14: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

0.00%

20.00%

40.00%

60.00%

80.00%

100.00%

120.00%

10/5

/200

2

1/5/

2003

4/5/

2003

7/5/

2003

10/5

/200

3

1/5/

2004

4/5/

2004

7/5/

2004

10/5

/200

4

1/5/

2005

4/5/

2005

7/5/

2005

Exchange Server Buffer Overflow

Microsoft Exchange Server BufferOverflow Vulnerability

Microsoft Exchange Server Buffer Overflow Vulnerability

CAN-2003-0714Qualys ID 74143

Released: October 2003

Microsoft Exchange Server Buffer Overflow Vulnerability

CAN-2003-0714Qualys ID 74143

Released: October 2003

Page 15: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

0%

20%

40%

60%

80%

100%

120%

10/5

/200

212

/5/2

002

2/5/

2003

4/5/

2003

6/5/

2003

8/5/

2003

10/5

/200

312

/5/2

003

2/5/

2004

4/5/

2004

6/5/

2004

8/5/

2004

10/5

/200

412

/5/2

004

2/5/

2005

4/5/

2005

6/5/

2005

8/5/

2005

Adobe Acrobat Format StringVulnerability

Adobe Acrobat Reader Format String Vulnerability

Adobe Acrobat Reader Format String Vulnerability

CAN-2004-1153Qualys ID 38385

Released: December 2004

Adobe Acrobat Reader Format String Vulnerability

CAN-2004-1153Qualys ID 38385

Released: December 2004

Page 16: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

0%

20%

40%

60%

80%

100%

120%

10/5

/200

212

/5/2

002

2/5/

2003

4/5/

2003

6/5/

2003

8/5/

2003

10/5

/200

312

/5/2

003

2/5/

2004

4/5/

2004

6/5/

2004

8/5/

2004

10/5

/200

412

/5/2

004

2/5/

2005

4/5/

2005

6/5/

2005

8/5/

2005

SMB Remote Execution Vulnerability

Microsoft Server Message Block Remote Execution(MS05-011)

Remote Code Execution Vulnerability in Microsoft Server Message Block

(SMB)

CAN-2005-0045Qualys ID 90230

Released: February 2005

Remote Code Execution Vulnerability in Microsoft Server Message Block

(SMB)

CAN-2005-0045Qualys ID 90230

Released: February 2005

Page 17: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

External vs. Internal Half-life

19 days

25%

50%

75%

100%

38 days 57 days 76 days 95 days

For a critical vulnerability every 19 days (48 days on internal networks)

50 % of vulnerable systems are being fixed

For a critical vulnerability every 19 days (48 days on internal networks)

50 % of vulnerable systems are being fixed

114 days 133 days 152 days 171 days

Page 18: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

The Changing Half-life

2003 2004 2005 2006

External

Half-life

30

days

21

days

19

days

48

days

?

Internal

Half-life-

62

days?

Page 19: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

0%

20%

40%

60%

80%

100%

120%

7/30

/200

5

8/6/

2005

8/13

/200

5

8/20

/200

5

8/27

/200

5

9/3/

2005

9/10

/200

5

9/17

/200

5

9/24

/200

5

10/1

/200

5

Predefined Release

Predefined vs. Irregular Vulnerability Releases

0%

20%

40%

60%

80%

100%

120%

7/30

/200

5

8/6/

2005

8/13

/200

5

8/20

/200

5

8/27

/200

5

9/3/

2005

9/10

/200

5

9/17

/200

5

9/24

/200

5

10/1

/200

5

Irregular Release

Vulnerabilities released on a predefined known

schedule show 18% faster patch response

Vulnerabilities released on a predefined known

schedule show 18% faster patch response

Page 20: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

0

500

1000

1500

2000

2500

3000

3500

3/1/

2003

5/1/

2003

7/1/

2003

9/1/

2003

11/1

/200

3

1/1/

2004

3/1/

2004

5/1/

2004

7/1/

2004

9/1/

2004

11/1

/200

4

1/1/

2005

3/1/

2005

5/1/

2005

7/1/

2005

9/1/

2005

SSL Server allows Cleartext

SSL Server Allows Cleartext Communication

SSL Server Allows Cleartext Communication

Qualys ID 38143

SSL Server Allows Cleartext Communication

Qualys ID 38143

Page 21: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

0%

20%

40%

60%

80%

100%

120%

2/8/

2003

4/8/

2003

6/8/

2003

8/8/

2003

10/8

/200

3

12/8

/200

3

2/8/

2004

4/8/

2004

6/8/

2004

8/8/

2004

10/8

/200

4

12/8

/200

4

2/8/

2005

4/8/

2005

6/8/

2005

8/8/

2005

SQL Slammer Vulnerability

SQL Slammer Vulnerability

MS-SQL 8.0 UDP Slammer Worm Buffer Overflow Vulnerability

CAN-2002-0649Qualys ID 19070

Released: July 2002

MS-SQL 8.0 UDP Slammer Worm Buffer Overflow Vulnerability

CAN-2002-0649Qualys ID 19070

Released: July 2002

Page 22: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Lingering Vulnerabilities: SNMP Writable

0%

20%

40%

60%

80%

100%

120%10

/5/2

002

1/5/

2003

4/5/

2003

7/5/

2003

10/5

/200

3

1/5/

2004

4/5/

2004

7/5/

2004

10/5

/200

4

1/5/

2005

4/5/

2005

7/5/

2005

SNMP Writeable

Page 23: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Vulnerability Lifespan

19 days

25%

50%

75%

100%

38 days 57 days 76 days 95 days

4% of critical vulnerabilities remain persistent and

their lifespan is unlimited

4% of critical vulnerabilities remain persistent and

their lifespan is unlimited

114 days

Page 24: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Window of Exposure

19 days

25%

50%

75%

100%

38 days 57 days 76 days 95 days

80% of exploits are available within the first half-life period of critical vulnerabilities

80% of exploits are available within the first half-life period of critical vulnerabilities

114 days

Page 25: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

A Continuous Cycle of Infection

0

20

40

60

80

100

120

140

160

1803/

1/20

03

5/1/

2003

7/1/

2003

9/1/

2003

11/1

/200

3

1/1/

2004

3/1/

2004

5/1/

2004

7/1/

2004

9/1/

2004

11/1

/200

4

1/1/

2005

3/1/

2005

5/1/

2005

7/1/

2005

9/1/

2005

CoderedSlapperBlasterNachiSasserZotobAutomated attacks create 85%

of their damage within the first fifteen days from outbreak

and have unlimited life time

Automated attacks create 85% of their damage within the

first fifteen days from outbreak and have unlimited life time

Page 26: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

0

50000

100000

150000

200000

250000

300000

350000

400000

10% Most Prevalent Vulnerabilities90% Remaining Vulnerabilities

Mapping Vulnerability PrevalenceV

ulne

rabi

lity

Pre

vale

nce

Individual Vulnerabilities

90% of vulnerability exposure is caused by 10% of critical vulnerabilities

90% of vulnerability exposure is caused by 10% of critical vulnerabilities

Page 27: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

0

50000

100000

150000

200000

250000

300000

350000

400000

Vulnerability Prevalence 2004Vulnerability Prevalence 2005

The Changing Top of the Most Prevalent

50% of the most prevalent and critical vulnerabilities are being replaced by new

vulnerabilities on an annual basis

50% of the most prevalent and critical vulnerabilities are being replaced by new

vulnerabilities on an annual basis

Page 28: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Top 10 External (Most Prevalent and Critical Vulnerabilities) as of November 15, 2005

Title Qualys ID CVE Reference External Reference

Buffer overflow in Microsoft Local Security Authority Subsystem Service (LSASS) 90108CAN-2003-0533 MS04-011

Buffer Management Vulnerability in OpenSSH 38217CAN-2003-0693 CA-2003-24

Sendmail Prescan() Variant Remote Buffer Overrun Vulnerability 50080CAN-2003-0694 CA-2003-25

Microsoft Windows RPC Runtime Library Vulnerability 68528CAN-2003-0813 MS04-012

Microsoft Windows ASN.1 Library Integer Handling Vulnerability 90103CAN-2003-0818 MS04-007

Windows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244CAN-2005-0048 MS05-019

Microsoft SMB Remote Code Execution Vulnerability 90252CAN-2005-1206 MS05-027

Writeable SNMP Information 78031N/A N/A

Unauthenticated Access to FTP Server Allowed 27210 N/A N/A

SSL Server Allows Cleartext Communication Vulnerability 38143 N/A N/A

Page 29: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Top 10 Internal (Most Prevalent and Critical Vulnerabilities) as of November 15, 2005

Title Qualys ID CVE Reference External Reference

Microsoft Messenger Service Buffer Overrun Vulnerability 70032CAN-2003-0717 MS03-043

Microsoft Windows RPC Runtime Library Vulnerability 68528CAN-2003-0813 MS04-012

Microsoft Windows ASN.1 Library Integer Handling Vulnerability 90103CAN-2003-0818 MS04-007

Microsoft Word Vulnerability Could Allow Remote Code Execution 110031CAN-2005-0558 MS05-023

Microsoft SMB Remote Code Execution Vulnerability 90252CAN-2005-1206 MS05-027

Microsoft Windows Print Spooler Service Remote Code Execution 90270CAN-2005-1984 MS05-043

Microsoft MSDTC and COM+ Remote Code Execution Vulnerability 90274CAN-2005-2119 MS05-051

Microsoft Internet Explorer Cumulative Patch Missing 100030CAN-2005-2127 MS05-052

Graphics Rendering Engine Multiple Code Execution Vulnerabilities 90284CAN-2005-2123 MS05-053

Adobe Acrobat Reader Remote Buffer Overflow Vulnerability 38461CAN-2005-2470 N/A

Page 30: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

The Record Breakers

• Fastest fixed Vulnerability— Windows Plug and Play vulnerability - MS05-039

• Longest lingering critical vulnerability— SNMP Writeable

• Most Prevalent critical vulnerability— Microsoft Windows DCOM RPC

• Most active Worm: — Blaster

Page 31: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Myth About Wireless Security

Emerging technologies, such as wireless networks are a significant security

vulnerability in enterprise environments

Page 32: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

The Real World: Configuration Issuesin Wireless Access Points

0

20

40

60

80

100

120

140

160

180

200

Q402 Q103 Q203 Q303 Q403 Q104 Q204 Q304 Q404 Q105 Q205 Q305

Open AP / No WEPAP with default password

Page 33: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Conclusion: Wireless Security Vulnerability

The issue of security vulnerabilities in

Wireless devices is significantly overrated –

only 1 in nearly 20,000 critical vulnerabilities

is caused by a wireless device.

Page 34: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

The Laws of Vulnerabilities

#1. Half-Life

The half-life of critical vulnerabilities is 19 days on external systems and 48 days on internal systems, and doubles with lowering degrees of severity

#2. Prevalence50% of the most prevalent and critical vulnerabilities are replaced by new vulnerabilities on an annual basis

#3. Persistence4% of critical vulnerabilities remain persistent, and their lifespan is unlimited

Page 35: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

The Laws of Vulnerabilities

#4. Focus

90% of vulnerability exposure is caused by 10% of critical vulnerabilities

#5. Window of ExposureThe time-to-exploit cycle is shrinking faster than the remediation cycle. 80% of exploits are available within the first half-life period of critical vulnerabilities

#6. ExploitationAutomated attacks create 85% of their damage within the first fifteen days from the outbreak and have unlimited life time

Page 36: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Goal for 2006: Shortening the Half-Lifeof Critical Vulnerabilities by 20%

48 days

25%

50%

75%

100%

96 days 144 days 192 days 240 days

2006

2005

288 days

•Awareness •Prioritization•Security-Enforcement

•Awareness •Prioritization•Security-Enforcement

Page 37: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Common Vulnerability Scoring System(CVSS)

• Industry Standard for common vulnerability scoring supported by CERT, Mitre, Cisco, Symantec, Microsoft, and Qualys

• CVSS provides an industry standard vulnerability scoring that allows corporations to take into consideration their own security metrics

• User customizable scoring based on three criteria—Base - Inherent threat of the vulnerability

—Temporal - Time of vulnerability’s existence

—Environmental - User environment variables

• Customer Benefits—Prioritize remediation on critical assets

—Identify risk on individual hosts

Page 38: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Proposed Solutions

• Establish enterprise vulnerability management program

• Network Admission Control (NAC) is a new trend to stop threats before they affect the enterprise

• Enforce best practices for configuration and policy management

• New standard for prioritization of remediation – CVSS

Page 39: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Summary and Actions We Can Take

• Significant progress on improving the remediation cycle

• Predefined vulnerability release schedules are shortening the patch cycle

• Need to counter the shrinking time-to-exploit cycle

• Goal: Shortening the Half-Life of vulnerabilities by 20% within one year

• Required: Your support to reach this goal

Page 40: The Laws of VulnerabilitiesWindows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities 90244 CAN-2005-0048 MS05-019 Microsoft SMB Remote Code Execution Vulnerability

Thank You

• References: — http://www.qualys.com/laws This presentation and any

future updates

— http://www.qualys.com/top10 Continuously updated Top Ten Index of most prevalent and critical external and internal vulnerabilities

— http://www.qualys.com/top10scan Free Top Ten Assessment Tool

— http://www.first.org/cvss Information about CVSS

• Comments and Suggestions: [email protected]