Tracking code bugs seems like a good practice for any company regardless of size or industry, and for the past 16 years, open-source offering Bugzilla has helped information technology (IT) professionals do exactly that. But on Sept. 30, researchers from Check Point Software Technologies found a Bugzilla flaw that lets users “masquerade their identity and register under an email address not in their control.” In some instances, the flaw will “automatically provide the user with certain elevated permissions, if these are given to groups defined by regex matching.” Although a patch has been released, it’s no surprise this bug is still giving users the creeps. If companies can’t trust the bug tracker, which app is the next one to get squashed?
Bugzilla Flaw Stings
Bugzilla is a popular program. According to InfoWorld, it is used by the Mozilla Foundation, the Apache Software Foundation, Linux kernel developers, OpenOffice, OpenSSH and GNOME, to name a few. Why? Because it’s a great way to track, record and analyze potential flaws in a system. Users can comment, brainstorm and develop ways to combat small problems before they become big issues. The Bugzilla flaw, however, gives unauthorized users access to entire “collections” of bugs amassed by companies, allowing them to view vulnerabilities that have never been public or delete bug entries altogether. What’s more, the flaw has been part of the program since 2006, meaning any company using the software must get it patched immediately.
Specifically, vulnerability CVE-2014-1572 is caused by a “perl-specific security problem” that occurs during assignment of the hash value. According to Bugzilla developer Gervase Markham, the flaw “allows an attacker to override values already in the hash (specified earlier), which may have already been validated, with values controlled by them.” Attackers using a fake email address such as “.*@mozilla.com” could gain access to all entries contributed by users under that global suffix. Although no breaches have been reported, there is a real potential for exploitation or, at the very least, compromised work on security patches if hackers edit or delete bug entries.
Of Bugs and Budgets
With vulnerabilities such as Heartbleed, Shellshock and now Bugzilla causing problems in 2014, it’s small wonder that CSO Online’s “Global State of Information Security Survey” found companies reporting a 48 percent increase in IT security incidents. What’s surprising, however, is that security budgets are down 4 percent this year — especially since the cost of a breach has gone up by 53 percent for large corporations. Where’s the disconnect?
Part of the problem stems from the seemingly random nature of this Bugzilla flaw and other recent breaches. While companies continue to use standard perimeter defense techniques and beef up cloud-based protection, these bugs emerge from years of dormancy to blow secure servers wide open. Therefore, it’s likely that businesses are losing faith in more traditional security techniques — in fact, the survey found that 64 percent of companies now integrate analytics as part of their security practice and 55 percent say they’ve detected more problems as a result.
Ultimately, the Bugzilla flaw teaches a harsh lesson: No code is truly safe. Security researchers are getting better at catching zero-day exploits in the early stages and then patching vulnerabilities, but for many companies, this doesn’t quite soothe the sting. As a result, security budgets are trending downward and enterprises are looking for new ways to identify malicious behaviors, detect possible flaws and develop systems designed to handle bugs rather than betting on a network-wide insecticide.