Home Business IT Security 25 Years of vulnerabilities - Linux has the most

Researchers at Sourcefire have analysed 25 years of vulnerabilities that were reported to CVE and NVD databases and found some interesting results.

According to the report (lead author Yves Younan, Senior Research Engineer at Sourcefire):

We leveraged two well-respected data sources for our research. First, our classifications of vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) database which is used today as an international standard for vulnerability numbering or identification. The database provides 25 years of information on vulnerabilities to assess, spanning 1988 to current.

Next, we used information hosted in the National Vulnerability Database (NVD) at the National Institute of Standards and Technology (NIST). We did some normalization to the data with respect to vulnerability categorization to be able to provide more complete statistics.

Not wishing to steal all of the report's thunder, we will summarise only a few of the findings, the full report is available here (free registration is required).

The following three charts (derived from the report) illustrate the fact that the raw numbers of detected vulnerabilities peaked in around 2006 / 07 and have since declined to pre-2005 levels (the jury is still out on whether 2012 is an outlier or the start of a new trend).

 

Figure1: Total Vulnerabilities by Year

 

Figure2: High Severity Vulnerabilities by Year

 

Figure3: High Severity Vulnerabilities as a percentage of Total by Year

When the report turned its attention to the actual vulnerabilities independently of the products, it found that Cross-Site Scripting (XSS) vulnerabilities were very high in frequency, however, when the analysis was tightened to show only critical errors, this category almost completely vanished, instead, buffer overflows became the force to be reckoned with. "we believe it is now safe to declare the buffer overflow the vulnerability of the quarter-century."

 

Figure 4: Critical Vulnerabilities as a percentage by type

It would also appear that researchers (and 'hackers') appear to have a "flavour of the year" when it comes to discovered and reported issues.


 

Figure 5: Top three vulnerability types by year

Of some interest to the various OS and manufacturer bashers, the report found that, as a product, the Linux kernel had the most vulnerabilities, while, as a manufacturer, Microsoft won top place - Microsoft winning purely for having such a broad product offering, and being such an obvious target.

Although Linux is listed as number one, it's worth noting that various iterations of Windows are considered different products, while Linux is considered a single product and Mac OS X are considered three products, which further skews the data. If we account for unique CVEs for every possible version of Windows excluding the mobile ones (that's a total of 13 versions), we get a total of 1114 vulnerabilities in Windows. For Mac OS, which has three versions (including X and the previous Mac OS iterations), we get a total of 827. Of course these vulnerabilities in Windows and Mac OS are not solely in the kernel. Doing the same for Linux as Windows (by adding the unique CVEs assigned to major vendors like Ubuntu and Red Hat), we get a total of 1752 vulnerabilities.

No attempt is made to explain reasons for the relative values.  For instance the easy availability of Linux kenel code may-well make it easier to locate problems, giving strength to the "many eyes" argument; should Microsoft's products have the same scrutiny, they may-well have exceeded Linux in the vulnerability count.  However, there is no way to know.

The report also considered the various software products in a variety of categories in some depth. The following comment makes a useful summary.

Google and Apple […] have significantly different track records for their browsers when compared to their mobile operating systems. Chrome is ranked as one of the highest for vulnerabilities, while Android has very few; iPhone has a significant lead on vulnerabilities, while Safari has the fewest compared to the other browsers.

Of course this report makes no effort to compare the number and severity of vulnerabilities with the interest in them by the bad guys. For instance, the very public problems recently seen in Flash and other consumer-oriented tools is in sharp contrast with these product's positions in the frequency charts.

We commend this report to our readers.

LEARN NBN TRICKS AND TRAPS WITH FREE NBN SURVIVAL GUIDE

Did you know: Key business communication services may not work on the NBN?

Would your office survive without a phone, fax or email?

Avoid disruption and despair for your business.

Learn the NBN tricks and traps with your FREE 10-page NBN Business Survival Guide

The NBN Business Survival Guide answers your key questions:

· When can I get NBN?
· Will my business phones work?
· Will fax & EFTPOS be affected?
· How much will NBN cost?
· When should I start preparing?

DOWNLOAD NOW!

David Heath

joomla statistics

David Heath has over 25 years experience in the IT industry, specializing particularly in customer support, security and computer networking. Heath has worked previously as head of IT for The Television Shopping Network, as the network and desktop manager for Armstrong Jones (a major funds management organization) and has consulted into various Australian federal government agencies (including the Department of Immigration and the Australian Bureau of Criminal Intelligence). He has also served on various state, national and international committees for Novell Users International; he was also the organising chairman for the 1994 Novell Users' Conference in Brisbane. Heath is currently employed as an Instructional Designer, building technical training courses for industrial process control systems.

 

 

 

 

Connect

Join the iTWire Community and be part of the latest news, invites to exclusive events, whitepapers and educational materials and oppertunities.
Why do I want to receive this daily update?
  • The latest features from iTWire
  • Free whitepaper downloads
  • Industry opportunities