Or How To Ensure Your Open Source Product Survives the Onslaught of Publicly Known Security Vulnerabilities
Drinking From The CVE Firehose
Ryan Ware Intel Corporation
Drinking From The CVE Firehose Or How To Ensure Your Open Source - - PowerPoint PPT Presentation
Drinking From The CVE Firehose Or How To Ensure Your Open Source Product Survives the Onslaught of Publicly Known Security Vulnerabilities Ryan Ware Intel Corporation What is a security vulnerability? No! Really! Im Not Joking! What Is
Or How To Ensure Your Open Source Product Survives the Onslaught of Publicly Known Security Vulnerabilities
Ryan Ware Intel Corporation
No! Really! I’m Not Joking! What Is It?!?
This Is Your Intended Product Designed But Not Implemented “Extra” Functionality
1 2 4 8 16 32 64 January February March April May June July August September October November December
2016 Vulnerabilities In 4 Common Components
Linux Kernel OpenSSL LibTiff ffmpeg
8
MuhmadEmad”
HaCk3D”
SNIPER”
* Hits from Google on 2/20/17
National Interest Personal Gain Personal Fame Curiosity Script-Kiddy Hobbyist Hacker Expert Specialist
Vandal Money Spy Trespasser
The World Today
Tools created by experts now used by less-skilled attackers and criminals Fastest growing segment
Author
software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities.” – Wikipedia [1]
Google, Facebook, Microsoft, Dell, PayPal and Yahoo. , and PayPal.
Chromebook or Chromebox with device persistence in guest mode.
15
16
Vulnerabilities and Exposures
known software security vulnerabilities starting in 1999
and maintains CVE on behalf
Division
Vulnerabilities in Database
17
CVEs for internally found security issues
publish CVEs for found issues
implications are silently fixed by developers as functional bugs
18
19
product!
20
https://cvedetails.com
21
(https://github.com/ikeydoherty/cv e-check-tool)
CVEs
22
different points (the ’attack vectors’) where an unauthorized user (the ‘attacker’) can try to enter data to or extract data from an environment.” – Wikipedia
requires.
attacker.
Nothing more satisfying than being able to respond to a CVE by saying, “Doesn’t affect me.”
23
Least Privilege
function Defense in Depth
24
Code Reviews
Validation
25
programs play into it
Ryan Ware – ryan.r.ware@intel.com
26