October 10, 2014 By Douglas Bonderud 2 min read

Tracking code bugs seems like a good practice for any company regardless of size or industry, and for the past 16 years, open-source offering Bugzilla has helped information technology (IT) professionals do exactly that. But on Sept. 30, researchers from Check Point Software Technologies found a Bugzilla flaw that lets users “masquerade their identity and register under an email address not in their control.” In some instances, the flaw will “automatically provide the user with certain elevated permissions, if these are given to groups defined by regex matching.” Although a patch has been released, it’s no surprise this bug is still giving users the creeps. If companies can’t trust the bug tracker, which app is the next one to get squashed?

Bugzilla Flaw Stings

Bugzilla is a popular program. According to InfoWorld, it is used by the Mozilla Foundation, the Apache Software Foundation, Linux kernel developers, OpenOffice, OpenSSH and GNOME, to name a few. Why? Because it’s a great way to track, record and analyze potential flaws in a system. Users can comment, brainstorm and develop ways to combat small problems before they become big issues. The Bugzilla flaw, however, gives unauthorized users access to entire “collections” of bugs amassed by companies, allowing them to view vulnerabilities that have never been public or delete bug entries altogether. What’s more, the flaw has been part of the program since 2006, meaning any company using the software must get it patched immediately.

Specifically, vulnerability CVE-2014-1572 is caused by a “perl-specific security problem” that occurs during assignment of the hash value. According to Bugzilla developer Gervase Markham, the flaw “allows an attacker to override values already in the hash (specified earlier), which may have already been validated, with values controlled by them.” Attackers using a fake email address such as “.*@mozilla.com” could gain access to all entries contributed by users under that global suffix. Although no breaches have been reported, there is a real potential for exploitation or, at the very least, compromised work on security patches if hackers edit or delete bug entries.

Of Bugs and Budgets

With vulnerabilities such as Heartbleed, Shellshock and now Bugzilla causing problems in 2014, it’s small wonder that CSO Online’s “Global State of Information Security Survey” found companies reporting a 48 percent increase in IT security incidents. What’s surprising, however, is that security budgets are down 4 percent this year — especially since the cost of a breach has gone up by 53 percent for large corporations. Where’s the disconnect?

Part of the problem stems from the seemingly random nature of this Bugzilla flaw and other recent breaches. While companies continue to use standard perimeter defense techniques and beef up cloud-based protection, these bugs emerge from years of dormancy to blow secure servers wide open. Therefore, it’s likely that businesses are losing faith in more traditional security techniques — in fact, the survey found that 64 percent of companies now integrate analytics as part of their security practice and 55 percent say they’ve detected more problems as a result.

Ultimately, the Bugzilla flaw teaches a harsh lesson: No code is truly safe. Security researchers are getting better at catching zero-day exploits in the early stages and then patching vulnerabilities, but for many companies, this doesn’t quite soothe the sting. As a result, security budgets are trending downward and enterprises are looking for new ways to identify malicious behaviors, detect possible flaws and develop systems designed to handle bugs rather than betting on a network-wide insecticide.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today