The following text is
copyright 2004 by Network World, permission is hearby given for reproduction,
as long as attribution is given and this notice is included.
Core
software as security vulnerabilities
By Scott Bradner
The SANS Institute just
released its 2004 list of the "twenty most critical Internet security
vulnerabilities." It includes
10 threats in Windows-based systems and 10 threats in UNIX-based systems. The title is a little bit misleading
because they do not actually list specific vulnerabilities, instead they list
programs or subsystems that too often contain vulnerabilities. The whole list comes across a little bit
like telling someone to stop breathing in order to avoid getting cancer from
air pollution -- accurate but useless advice.
I'll focus on the Windows
part of the list (http://www.sans.org/top20/) since
many more people can relate to Windows vulnerabilities than can relate
to UNIX (including, I suppose, Mac OSX) vulnerabilities.
The ten
"vulnerabilities" on the SANS list are: web servers & services, workstation
service, Windows remote access services, Microsoft SQL Server, Windows
authentication, web browsers, file-sharing applications, Windows Local Security Authority
Subsystem Service exposures, Microsoft Outlook mail client and
instant messaging.
You can't just turn all of these things off and have much of a system
left so, as the SANS commentary suggests, adopting aggressive patching strategies
are the Window's user's only hope for survival.
Most of the
problems the SANS Institute discusses
in conjunction with these Microsoft and non-Microsoft applications and Windows
subsystems can be summarized by saying that lots of
examples of poor programming practice have been found and exploited in this
software. I would expect that some
of the software listed this year will be replaced next year with other software
where the same sort of problems have been uncovered. With 40 or more million lines of secret source code in
Windows XP I find it hard to imagine that there are not many thousands of bugs
yet to be discovered.
(http://www.fact-index.com/s/so/source_lines_of_code.html) I expect that there are also many bugs
in the 30 or more million lines of source code in Linux but the public nature
of the code means that the problems may be found and fixed sooner.
Bugs in
software are to be expected since programmers are so often pesky humans and
perfection is an uncommon trait among humans. But some of the issues on the SANS list are not bugs -- they
are features. The best example is
the Outlook mail client, of which the SANS commentary politely says "the
embedded automation features are at odds with the built-in security controls
(often disregarded by end-users)."
In a bit of understatement, they go on to mention that "this has
given rise to e-mail viruses, worms, malicious code to compromise the local
system, and many other forms of attack." This kind of thing is far harder to fix.
If all this makes you
want to get an abacus (or a Mac) you are not alone but, sad to say, neither
solution is acceptable in much of today's workplace, even though at least the
Mac would do the job most of the time
- it's hard to do word processing on an abacus though.
That leads back to the
advice in the first paragraph --
which actually was about the only statistically valid result of the cancer and
air pollution research I participated in as a lab technician in my first job
out of BU.
disclaimer: Some things that Harvard's neighbors
see as bugs Harvard sees as features, students on a Saturday night for example,
but I did not ask the neighbors or Harvard about the above lament.