October 10, 2014 By Douglas Bonderud 2 min read

Tracking code bugs seems like a good practice for any company regardless of size or industry, and for the past 16 years, open-source offering Bugzilla has helped information technology (IT) professionals do exactly that. But on Sept. 30, researchers from Check Point Software Technologies found a Bugzilla flaw that lets users “masquerade their identity and register under an email address not in their control.” In some instances, the flaw will “automatically provide the user with certain elevated permissions, if these are given to groups defined by regex matching.” Although a patch has been released, it’s no surprise this bug is still giving users the creeps. If companies can’t trust the bug tracker, which app is the next one to get squashed?

Bugzilla Flaw Stings

Bugzilla is a popular program. According to InfoWorld, it is used by the Mozilla Foundation, the Apache Software Foundation, Linux kernel developers, OpenOffice, OpenSSH and GNOME, to name a few. Why? Because it’s a great way to track, record and analyze potential flaws in a system. Users can comment, brainstorm and develop ways to combat small problems before they become big issues. The Bugzilla flaw, however, gives unauthorized users access to entire “collections” of bugs amassed by companies, allowing them to view vulnerabilities that have never been public or delete bug entries altogether. What’s more, the flaw has been part of the program since 2006, meaning any company using the software must get it patched immediately.

Specifically, vulnerability CVE-2014-1572 is caused by a “perl-specific security problem” that occurs during assignment of the hash value. According to Bugzilla developer Gervase Markham, the flaw “allows an attacker to override values already in the hash (specified earlier), which may have already been validated, with values controlled by them.” Attackers using a fake email address such as “.*@mozilla.com” could gain access to all entries contributed by users under that global suffix. Although no breaches have been reported, there is a real potential for exploitation or, at the very least, compromised work on security patches if hackers edit or delete bug entries.

Of Bugs and Budgets

With vulnerabilities such as Heartbleed, Shellshock and now Bugzilla causing problems in 2014, it’s small wonder that CSO Online’s “Global State of Information Security Survey” found companies reporting a 48 percent increase in IT security incidents. What’s surprising, however, is that security budgets are down 4 percent this year — especially since the cost of a breach has gone up by 53 percent for large corporations. Where’s the disconnect?

Part of the problem stems from the seemingly random nature of this Bugzilla flaw and other recent breaches. While companies continue to use standard perimeter defense techniques and beef up cloud-based protection, these bugs emerge from years of dormancy to blow secure servers wide open. Therefore, it’s likely that businesses are losing faith in more traditional security techniques — in fact, the survey found that 64 percent of companies now integrate analytics as part of their security practice and 55 percent say they’ve detected more problems as a result.

Ultimately, the Bugzilla flaw teaches a harsh lesson: No code is truly safe. Security researchers are getting better at catching zero-day exploits in the early stages and then patching vulnerabilities, but for many companies, this doesn’t quite soothe the sting. As a result, security budgets are trending downward and enterprises are looking for new ways to identify malicious behaviors, detect possible flaws and develop systems designed to handle bugs rather than betting on a network-wide insecticide.

More from

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today