Vulnerability disclosure is the practice of reporting security flaws in computer software or hardware. Disclosure, and how it is performed, is often a contentious issue. Generally, vendors prefer to keep a vulnerability under wraps until they have a patch ready to distribute to users. Conversely, researchers and security professionals whose data or systems are at risk, prefer that disclosures be made public as soon as possible. Typically, vendors or developers wait until a patch or other mitigation is available before making a vulnerability public; this approach is often referred to as responsible disclosure. Researchers tell the system providers about the vulnerability and provide vendors with reasonable timelines to investigate and fix them and then publicly disclose vulnerabilities once they've been patched. Although there's no formal industry standard when it comes to reporting vulnerabilities, disclosures typically follow the same basic steps: A researcher discovers a security vulnerability and determines its potential impact. The finder then documents the vulnerability's location. The researcher develops a vulnerability advisory report detailing the vulnerability with supporting evidence and provides a full disclosure timeline. The researcher then securely submits this report to the vendor. The researcher allows the vendor a reasonable amount of time to investigate and patch the vulnerability according to the advisory full disclosure timeline. Once a patch is available, or the timeline for disclosure has elapsed, the researcher publishes a full disclosure analysis of the exploit, including a detailed explanation of the vulnerability, its impact as well as the resolution. Typical responsible disclosure guidelines allow vendors from 60 to 120 days to patch a vulnerability. In many cases, vendors negotiate with researchers to modify the schedule to allow for more time to fix difficult flaws. In 2010, Microsoft attempted to reshape the disclosure landscape by introducing a concept called coordinated disclosure, also referred to as coordinated vulnerability disclosure (CVD). This protocol calls for researchers and vendors to work together to identify and fix the vulnerabilities and negotiate a mutually agreeable amount of time for patching the product and informing the public. Read more... |
No comments:
Post a Comment