Study: Largest vendors account for fewer software flaws
Improved quality assurance, testing likely reasons for improvement
Though it might not seem that way, the top 10 most vulnerable software vendors -- and, yes, that includes Microsoft Corp. -- are contributing a smaller percentage of all vulnerability disclosures per year compared with five years ago.
Ollmann, who crunched vulnerability data gathered by X-Force between 2002 and 2006, said the overall percentage of security flaws disclosed by the most vulnerable software vendors dropped from 20.2% in 2002 to 14.6% during that period.
Much of that decrease is likely the result of improved quality assurance and testing processes by the most vulnerable software vendors, Ollmann said. Most of their software packages have been through multiple versions and have been combed thoroughly for vulnerabilities by security researchers, he said.
According to Ollmann, the most vulnerable vendors typically have also been the biggest software vendors and those with the largest installed bases. Traditionally, security researchers and hackers have gone after vendors with the biggest installed bases because that is where they can have the biggest impact.
As larger vendors begin to do a better job of locking down their software, hackers and software researchers have begun focusing their attention on newer vendors and their applications, which has resulted in an overall increase in the number of vulnerabilities being reported, Ollmann said.
In the past five years, the list of the most vulnerable vendors has consistently included Microsoft, Cisco Systems Inc., IBM, Sun Microsystems Inc. and the Linux Kernel Organization Inc., Ollmann said. Others on the list for 2006 were Oracle Corp., Apple Inc., Mozilla Corp. and Adobe Systems Inc.
Together, these vendors accounted for 964 vulnerabilities in 2006, or roughly 14% of the total disclosed by all vendors. The remaining 85% or more were accounted for by smaller vendors. For instance, nearly 1,000 vulnerabilities were reported by relatively small vendors of PHP applications, he said.
Ollmann acknowledged that the vulnerabilities reported by the top 10 are likely to have affected a far larger number of people than a majority of the flaws reported by smaller vendors. At the same time, it is also true that the larger vendors have been doing a better job in fixing reported flaws, he said.
Out of the top 10 vendors, only 14% of the publicly reported flaws remained unpatched in 2006, while 65% of all other publicly reported flaws remain unpatched.
Larger vendors are also more likely than smaller ones to have better mechanisms for detecting flaws and alerting customers, he added.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts