Study: Largest vendors account for fewer software flaws
Improved quality assurance, testing likely reasons for improvement
Though it might not seem that way, the top 10 most vulnerable software vendors -- and, yes, that includes Microsoft Corp. -- are contributing a smaller percentage of all vulnerability disclosures per year compared with five years ago.
Ollmann, who crunched vulnerability data gathered by X-Force between 2002 and 2006, said the overall percentage of security flaws disclosed by the most vulnerable software vendors dropped from 20.2% in 2002 to 14.6% during that period.
Much of that decrease is likely the result of improved quality assurance and testing processes by the most vulnerable software vendors, Ollmann said. Most of their software packages have been through multiple versions and have been combed thoroughly for vulnerabilities by security researchers, he said.
According to Ollmann, the most vulnerable vendors typically have also been the biggest software vendors and those with the largest installed bases. Traditionally, security researchers and hackers have gone after vendors with the biggest installed bases because that is where they can have the biggest impact.
As larger vendors begin to do a better job of locking down their software, hackers and software researchers have begun focusing their attention on newer vendors and their applications, which has resulted in an overall increase in the number of vulnerabilities being reported, Ollmann said.
In the past five years, the list of the most vulnerable vendors has consistently included Microsoft, Cisco Systems Inc., IBM, Sun Microsystems Inc. and the Linux Kernel Organization Inc., Ollmann said. Others on the list for 2006 were Oracle Corp., Apple Inc., Mozilla Corp. and Adobe Systems Inc.
Together, these vendors accounted for 964 vulnerabilities in 2006, or roughly 14% of the total disclosed by all vendors. The remaining 85% or more were accounted for by smaller vendors. For instance, nearly 1,000 vulnerabilities were reported by relatively small vendors of PHP applications, he said.
Ollmann acknowledged that the vulnerabilities reported by the top 10 are likely to have affected a far larger number of people than a majority of the flaws reported by smaller vendors. At the same time, it is also true that the larger vendors have been doing a better job in fixing reported flaws, he said.
Out of the top 10 vendors, only 14% of the publicly reported flaws remained unpatched in 2006, while 65% of all other publicly reported flaws remain unpatched.
Larger vendors are also more likely than smaller ones to have better mechanisms for detecting flaws and alerting customers, he added.
Read more about Security in Computerworld's Security Topic Center.
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Ponemon 2014 SSH Security Vulnerability Report According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!