October 10, 2014 By Douglas Bonderud 2 min read

Tracking code bugs seems like a good practice for any company regardless of size or industry, and for the past 16 years, open-source offering Bugzilla has helped information technology (IT) professionals do exactly that. But on Sept. 30, researchers from Check Point Software Technologies found a Bugzilla flaw that lets users “masquerade their identity and register under an email address not in their control.” In some instances, the flaw will “automatically provide the user with certain elevated permissions, if these are given to groups defined by regex matching.” Although a patch has been released, it’s no surprise this bug is still giving users the creeps. If companies can’t trust the bug tracker, which app is the next one to get squashed?

Bugzilla Flaw Stings

Bugzilla is a popular program. According to InfoWorld, it is used by the Mozilla Foundation, the Apache Software Foundation, Linux kernel developers, OpenOffice, OpenSSH and GNOME, to name a few. Why? Because it’s a great way to track, record and analyze potential flaws in a system. Users can comment, brainstorm and develop ways to combat small problems before they become big issues. The Bugzilla flaw, however, gives unauthorized users access to entire “collections” of bugs amassed by companies, allowing them to view vulnerabilities that have never been public or delete bug entries altogether. What’s more, the flaw has been part of the program since 2006, meaning any company using the software must get it patched immediately.

Specifically, vulnerability CVE-2014-1572 is caused by a “perl-specific security problem” that occurs during assignment of the hash value. According to Bugzilla developer Gervase Markham, the flaw “allows an attacker to override values already in the hash (specified earlier), which may have already been validated, with values controlled by them.” Attackers using a fake email address such as “.*@mozilla.com” could gain access to all entries contributed by users under that global suffix. Although no breaches have been reported, there is a real potential for exploitation or, at the very least, compromised work on security patches if hackers edit or delete bug entries.

Of Bugs and Budgets

With vulnerabilities such as Heartbleed, Shellshock and now Bugzilla causing problems in 2014, it’s small wonder that CSO Online’s “Global State of Information Security Survey” found companies reporting a 48 percent increase in IT security incidents. What’s surprising, however, is that security budgets are down 4 percent this year — especially since the cost of a breach has gone up by 53 percent for large corporations. Where’s the disconnect?

Part of the problem stems from the seemingly random nature of this Bugzilla flaw and other recent breaches. While companies continue to use standard perimeter defense techniques and beef up cloud-based protection, these bugs emerge from years of dormancy to blow secure servers wide open. Therefore, it’s likely that businesses are losing faith in more traditional security techniques — in fact, the survey found that 64 percent of companies now integrate analytics as part of their security practice and 55 percent say they’ve detected more problems as a result.

Ultimately, the Bugzilla flaw teaches a harsh lesson: No code is truly safe. Security researchers are getting better at catching zero-day exploits in the early stages and then patching vulnerabilities, but for many companies, this doesn’t quite soothe the sting. As a result, security budgets are trending downward and enterprises are looking for new ways to identify malicious behaviors, detect possible flaws and develop systems designed to handle bugs rather than betting on a network-wide insecticide.

More from

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

AI cybersecurity solutions detect ransomware in under 60 seconds

2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher.Meanwhile, other dangers are appearing on the horizon. For example, the 2024 IBM X-Force Threat Intelligence Index states that threat group investment is increasingly focused on generative AI attack tools.Criminals have been…

The major hardware flaw in Apple M-series chips

3 min read - The “need for speed” is having a negative impact on many Mac users right now. The Apple M-series chips, which are designed to deliver more consistent and faster performance than the Intel processors used in the past, have a vulnerability that can expose cryptographic keys, leading an attacker to reveal encrypted data. This critical security flaw, known as GoFetch, exploits a vulnerability found in the M-chips data memory-dependent prefetcher (DMP). DMP’s benefits and vulnerabilities DMP predicts memory addresses that the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today