Windows XP and Firefox browser amass worst vulnerability record over past 25 years
- 25 February, 2013 15:02
In a look at the number of vulnerabilities recorded over 25 years in software products and open source, a researcher at Sourcefire has determined that Microsoft Windows XP and the Mozilla Firefox browser stand out as the two with the largest number of high-severity vulnerabilities.
Windows XP has had 453 while Firefox has had 433 vulnerabilities rated high and critical based on the Common Vulnerabilities and Exposures (CVE) database and the second source for the statistics, the National Vulnerability Database from the National Institute of Standards and Technology (NIST). High-severity vulnerabilities mean attackers can potentially fully compromise the user's machine. The total number of vulnerabilities for all the products and open-source software that has accumulated over 25 years has hit 50,000, according to Sourcefire, which is discussing the results of its research at the RSA Conference this week.
In the 25 years of recorded vulnerabilities examined this way, there was peak of 6,612 vulnerabilities in 2006 but the worst year overall for high-severity ones was 2007 at 3,159 out of a total of 6,518, says Dr. Yves Younan, senior research engineer on Sourcefire's vulnerability research team.
There was a notable decline in annually-recorded vulnerabilities until 2010. In 2012, a total of 5,281 vulnerabilities were recorded. The good news is that for the first time ever, high-severity vulnerabilities only make up 33% of the vulnerabilities assigned CVEs; in the previous decade the average was 45%.
When it comes to smartphones, "the Apple iPhone by far has the most vulnerabilities reported for it," Younan says. The iPhone has seen 210 vulnerabilities while Google Android logs in at 24, Windows Mobile at 14 and BlackBerry at 11.
When it comes to the type of vulnerabilities in general for everything, the category of "buffer overflows" is the most predominant at 7,006 occurrences, with cross-site scripting a close second. Buffer overflows are also more likely to have a high-severity rating, with catastrophic consequences leading to wholly compromised networks after an attack. Last year, though, "access-control issues reigned supreme."
Sourcefire's report on 25 years of vulnerabilities also tackles what it acknowledges as a "controversial topic" reviewing vulnerabilities by vendor and open-source software grouping.
According to the report's analysis, the "10 worst offenders" from top down were: Microsoft; Apple; Oracle; IBM; Sun (acquired by Oracle); Cisco; Mozilla; Linux; HP; Adobe. In terms of limiting the rankings to just high-severity vulnerabilities, the list is similar, with Microsoft at the top, and Google added into the group and "Linux" dropped.
Sourcefire acknowledges that some may argue with its analysis here. The "Linux kernel" had the most CVEs reported for it at 937, but the "various iterations of Windows are considered different products, while Linux is considered a single product and Mac OS X are considered three products, which further skews the data." But Sourcefire says by combining the CVEs for all versions of Windows except the mobile ones, Windows is pinned with 1,114 vulnerabilities. Doing something similar for Linux as it did for Window by adding CVEs assigned to major vendors like Ubuntu and Red Hat, the Linux count goes to 1,752 vulnerabilities. Mac OS comes out at a total of 827.
For high-severity vulnerabilities, the product Windows XP earns the dubious position of the No.1 spot. "What's also interesting here is that of the top four browsers that have a total of 90% of the browser market share, Firefox has the most vulnerabilities in every category, followed by Chrome, then Internet Explorer and finally Safari," the report concludes.
Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: MessmerE. E-mail: email@example.com.
Read more about wide area network in Network World's Wide Area Network section.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Bouncing Back From CIO Unemployment
Union slams latest fibre-to-premise trial in Tasmania
Evolving Threats Demand New Approaches to Security
As the world becomes increasingly hyperconnected, the opportunities for innovation are virtually limitless. At the same time, the complexity and risk associated with those opportunities is great. Security threats have the potential for enormous ramifications, but so does deploying a security strategy that compromises the user experience, performance, and the ability to innovate online. This paper will profile the emerging disruptive players, and identifies the essential steps to establishing a secure environment without compromising performance or experience.
How to Successfully Select an ERP System
An Enterprise Resource Planning (ERP) system is a series of software applications that collect and compiles data from different departments to enhance collaboration and co-ordination within the business. If you’re looking to implement your first ERP system, or to upgrade from an existing system, this whitepaper offers eight simple steps for selection that will lead to long-term strategic success.
Whitepaper: Preventing Data Loss Takes More Than MDM
You need to secure your BYOD devices—but MDM alone isn't enough to prevent data loss. Read this whitepaper—Data Loss Prevention: When MDM Is Not Enough—to learn how to combat MDM shortcomings. See how to add cross-platform security, implement protection policies, and address risks in consumer apps.