As you may know, we announced version four of the Microsoft Security Intelligence Report earlier this week. Amongst the many interesting findings is data which relates to software vulnerability exploits. I wanted to highlight these as Shoaib, one of my blog readers, contacted me recently to get my views on a post he wrote.
Here are the key findings:
We even added a table where we compared selected products in 2006 and 2007:
By CVE ID
2006
2007
Product
Version
CVE ID Count
CVE Exploits
Pct.
Delta CVE ID
Internet Explorer®
5
26
7
26.9%
19
3
15.8%
-11.1%
6
19.2%
-3.4%
0
—
Microsoft Office
2000
45
8
17.8%
21
11
52.4%
34.6%
XP
44
9
20.5%
24
45.8%
25.3%
2003
40
22.5%
23.3%
X-Mac
11.5%
2
40.0%
28.5%
2004-Mac
33
15.2%
22
36.4%
21.2%
1
11.1%
Windows®
98
27
25.9%
ME
22.2%
73
18
24.7%
51
11.8%
-12.9%
84
59
70.2%
55
10.9%
-59.3%
78
32
41.0%
57
36.8%
-4.2%
Windows Vista
0.0%
12
30.0%
So, what is this giving us?
When we look at attacks and the "time to exploit", which is definitely decreasing, we have to take into consideration that malware (often exploiting vulnerabilities) is more and more focused on financial gain. The chart below shows this very well:
So, what does this and the report above allow us to conclude:
One final comment: To me it is not only about exploits, it is about the process of creating Security Updates as well. In this context I would like to remind you of my recent post on 0-Day-Patch – An new Metric for Security?
Roger
PingBack from http://microsoft-site2008yr.freehostia.com/?p=1933
Roger,
Thanks for vlauable post.
I personally think. If we can develop best practices of Patch Management and deploy the patches in timely mannger. We will be able to combat with bad guys in much better way.
Cheers
Shoaib
Hi Shoaib,
there are actually best pratices out there:
http://www.microsoft.com/technet/community/columns/secmgmt/sm0506.mspx
http://technet.microsoft.com/en-us/library/bb735139.aspx
http://www.microsoft.com/technet/itsolutions/MSIT/Security/SMS03SPM.mspx
Hi Roger,
Thanks for sharing.
I will looking into it.
The length of time between the development of security patches and the development of exploits targeting