Study: Largest vendors account for fewer software flaws
Improved quality assurance, testing likely reasons for improvement
Though it might not seem that way, the top 10 most vulnerable software vendors -- and, yes, that includes Microsoft Corp. -- are contributing a smaller percentage of all vulnerability disclosures per year compared with five years ago.
Ollmann, who crunched vulnerability data gathered by X-Force between 2002 and 2006, said the overall percentage of security flaws disclosed by the most vulnerable software vendors dropped from 20.2% in 2002 to 14.6% during that period.
Much of that decrease is likely the result of improved quality assurance and testing processes by the most vulnerable software vendors, Ollmann said. Most of their software packages have been through multiple versions and have been combed thoroughly for vulnerabilities by security researchers, he said.
According to Ollmann, the most vulnerable vendors typically have also been the biggest software vendors and those with the largest installed bases. Traditionally, security researchers and hackers have gone after vendors with the biggest installed bases because that is where they can have the biggest impact.
As larger vendors begin to do a better job of locking down their software, hackers and software researchers have begun focusing their attention on newer vendors and their applications, which has resulted in an overall increase in the number of vulnerabilities being reported, Ollmann said.
In the past five years, the list of the most vulnerable vendors has consistently included Microsoft, Cisco Systems Inc., IBM, Sun Microsystems Inc. and the Linux Kernel Organization Inc., Ollmann said. Others on the list for 2006 were Oracle Corp., Apple Inc., Mozilla Corp. and Adobe Systems Inc.
Together, these vendors accounted for 964 vulnerabilities in 2006, or roughly 14% of the total disclosed by all vendors. The remaining 85% or more were accounted for by smaller vendors. For instance, nearly 1,000 vulnerabilities were reported by relatively small vendors of PHP applications, he said.
Ollmann acknowledged that the vulnerabilities reported by the top 10 are likely to have affected a far larger number of people than a majority of the flaws reported by smaller vendors. At the same time, it is also true that the larger vendors have been doing a better job in fixing reported flaws, he said.
Out of the top 10 vendors, only 14% of the publicly reported flaws remained unpatched in 2006, while 65% of all other publicly reported flaws remain unpatched.
Larger vendors are also more likely than smaller ones to have better mechanisms for detecting flaws and alerting customers, he added.
Read more about Security in Computerworld's Security Topic Center.
- The Pivotal Big Data Suite- Reducing the Risks of Big Data The explosion of big data and the rapid evolution of big data tools and technologies is challenging IT to meet the demands of...
- A Survival Guide for Data in the Wild All corporate data used to reside in the data center. Safe and sound behind the corporate firewall. But now, employees have multiple devices...
- Transforming Security: Designing a State-of-the-Art Extended Team The information security mission is no longer about implementing and operating controls.
- The Big Data Security Analytics Era Is Here New security risks and old security challenges often overwhelm legacy security controls and analytical tools.
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!