Font Size Change

HOMEIT SecurityMeasures for Information Security VulnerabilitiesIPA/ISEC:Vulnerabilities:JVN iPedia Registration Status for 2008 3Q

PRINT PAGE

IT Security

IPA/ISEC:Vulnerabilities:JVN iPedia Registration Status for 2008 3Q

JVN iPedia declared CWE-Compatible
CWE(Common Weakness Enumeration)

October 31, 2008
>> JAPANESE

Information-technology Promotion Agency, Japan (IPA, Chairman Koji Nishigaki) has issued a quarterly analysis report on the vulnerabilities registered to JVN iPedia, a vulnerability countermeasure information database, for the third quarter of the year 2008.

JVN iPedia( http://jvndb.jvn.jp/ ) is a database of vulnerability countermeasure information on IT products pervasively used in Japan. It is a collection of vulnerability information disclosed by the domestic software developers or published on JVN(*1) and on NVD(*2), a vulnerability database operated by NIST(*3), and has been in service since April 25, 2007.

About 300 vulnerabilities has been registered to JVN iPedia every quarter since its initial release of 3,562 vulnerabilities on April 25, 2007. As of September 30, 2008, the total number of vulnerabilities registered has grown to 5,347, of which 62 are collected from domestic software developers, 516 from JVN and 4,769 from NVD (see Figure 1 and Table 1).

In addition, the English version of JVN iPedia ( http://jvndb.jvn.jp/en/ ) was introduced on May 21, 2008, to promote the use of vulnerability information and strengthen international partnerships. The English version stores the total of 377 vulnerabilities, of which 62 are collected from domestic software developers and 315 are from JVN.

JVN iPedia began to support CWE(Common Weakness Enumeration) as a trial on September 10, 2008. IPA had worked on a few remaining requirements to make a CWE compatibility declaration and declared it CWE-Compatible on October 3, 2008.
The official list of organizations participating in the CWE Compatibility and Effectiveness Program is available on Mitre’s CWE web site(*4).
http://cwe.mitre.org/compatible/organizations.html

Among those CWE vulnerability types registered most in 2008/3Q(July – September) are CWE-399(Resource Management Error), CWE-264(Permissions, Privileges and Access Controls), CWE-20(Insufficient Input Validation), CWE-119(Buffer Errors (Failure to Constrain Operations within the Bounds of an Allocated Memory Buffer)) and CWE-79(Failure to Sanitize Directives in a Web Page (aka ‘Cross-site scripting’ (XSS))) (see Figure 2).
Most of the product vulnerabilities reported are caused by well-known vulnerabilities. The software developers should be well aware of known vulnerabilities and integrate security in the early stages of product development.

As seen in Table 2, among most accessed vulnerability information in JVN iPedia are those on popular software, such as DNS, Lhaplus, Apache, Adobe Reader/Acrobat and Sun JRE. JVN iPedia gets more than 100,000 hits monthly and IPA hopes people continue to refer to and use JVN iPedia as a central reference point for vulnerability information.

1.Summary of the 2008 3Q

1.1 Vulnerabilities Registered in 2008 3Q

During the third quarter of 2008 (from July 1 to September 30), the total of 305 vulnerabilities, of which 10 are collected from domestic software developers, 42 from JVN and 253 from NVD, have been registered to JVN iPedia (Table 1 and Figure 1).

The total sum of vulnerabilities registered since the initial release of JVN iPedia on April 25, 2007, is 5,347. Of those vulnerabilities, 62 are collected from domestic software vendors, 516 are from JVN and 4,769 are from NVD.

Table 1. Vulnerabilities Registered in 3Q

Source 2008 3Q Total Sum
Domestic Developers
10
62
JVN
42
516
NVD
253
4,769
Total
305
5,347

 

Figure1. Quarterly Changes in # of Registered Vulnerabilities

1.2 Types of Vulnerabilities

Figure 2 shows the number of vulnerabilities reported to JVN iPedia in 2008/3Q by CWE types.

The top 10 are: CWE-399(Resource Management Error) with 40 vulnerabilities, CWE-264(Permissions, Privileges and Access Controls) with 37, CWE-20(Insufficient Input Validation) with 35, CWE-119(Buffer Errors (Failure to Constrain Operations within the Bounds of an Allocated Memory Buffer)) with 31, CWE-79(Failure to Sanitize Directives in a Web Page (aka ‘Cross-site scripting’ (XSS))) with 29, CWE-189(Numeric Errors) with 28, CWE-200(Information Leak (Information Disclosure)) with 14, CWE-94(Code Injection) with 10, CWE-16(Configuration) with 5 and CWE-22(Path Traversal) with 5.

These are all well-known vulnerabilities. Software developers should refer to the IPA guidelines, such as How to Secure Your Web Site(*5), and start implementing security measures in the design phase of software development.

Figure2. Types of Registered Vulnerabilities in 2008 3Q

2.About Vulnerabilities Registered on JVN iPedia

2.1 Severity of Vulnerabilities

JVN iPedia rates and publishes the severity(*6) of each vulnerability using CVSS(*7).

Figure 3 shows the annual changes in the severity of vulnerabilities added to JVN iPedia based on the date they were first made public.

So far in 2008, 46 percent of the vulnerabilities are labeled the level III (“High”, CVSS Base Score = 7.0-10.0), 49 percent are the level ll (“Medium”, CVSS Base Score = 4.0-6.9) and 5 percent are the level I (“Low”, CVSS Base Score = 0.0-3.9).

The number of vulnerabilities disclosed has been increasing since 2004 and quite a number of them are rated as dangerous ones. The users need to check out vulnerability information on a daily basis and update the products they use to the latest version or apply security patches.

Figure3. Annual Changes in Severity of Vulnerabilities

2.2 Kinds of Products

Figure 4 shows the annual changes in the kinds of software products registered to JVN iPedia for having vulnerabilities based on the date they were first made public.

The increase in the number of vulnerabilities found in application software in recent years is prominent. The application software includes desktop applications such as Internet Explorer, Mozilla FireFox, Microsoft Office, middle wares such as Web server applications and databases, or development platforms such as PHP, Java and GNU libraries. Many software applications are developed every year, some of which regrettably with vulnerabilities.

The number of vulnerabilities in OS, such as Windows, Mac OS, UNIX and Linux, had been on the raise till about 2005, but the number has been decreasing since then. Vulnerabilities are still found in OS every year but the developers seem to be getting quick to fix them in the subsequent release.

Since about 2005, the number of vulnerability countermeasure information on embedded software, such as network devices, cell phones and intelligence home appliance like DVD recorders, has been on the rise. In 200/3Q, vulnerabilities countermeasure information about iPhone and iPod touch has been released.

Figure4. Annual Changes in Kinds of Product w/ Vulnerabilities

2.3 Open Source Software

Figure 5 shows the annual changes in vulnerabilities found in open source software (OSS) and non-OSS based on the date they were first made public. 37 percent of the vulnerabilities registered are of OSS and 63 percent are of non-OSS. As for the ratio between OSS and non-OSS, OSS had been on the raise from 1998 to 2003 and marked its highest in 2003, but it has been decreasing since then.

Figure5. Annual Changes in # of OSS and Non OSS Cases

2.4 Product Vendors

Figure 6 and 7 show breakdown of software vendors registered on JVN iPedia. Figure 6 is a breakdown of OSS vendors and Figure 7 of non-OSS vendors.

There are total of 229 OSS vendors, of which 51 are domestic vendors, 21 are oversea vendors with office in Japan, 157 are oversea vendors without office in Japan (Figure 6). For non-OSS vendors, there are total of 146 vendors, of which 91 are domestic vendors, 42 are oversea vendors with office in Japan and 13 are oversea vendors without office in Japan (Figure 7).

As seen in these figures, a number of vulnerabilities have been found in the products developed by the oversea vendors that do not have a Japanese office. When using OSS, if users do not know how to update software to the latest version or apply security patches, they may consider making some arrangements for the support or maintenance service offered by the vendor.

Figure6. OSS Vendors, Figure7. Non OSS Vendors

3.Most Accessed Vulnerability Countermeasure Information

Table 2 is a list of top 20 most accessed vulnerability countermeasure information on JVN iPedia in 2008/3Q. The vulnerabilities of pervasively used products, such as DNS, Lhaplus, Apache, Adobe Reader/Acrobat and Sun JRE, with a high severity score and recent issue date have been accessed most.

Table 3 narrows the list to top 5 most accessed vulnerability countermeasure information collected from domestic software developers.

Table 2. Top 20 Most Accessed Vulnerability Countermeasure Information on JVN iPedia

#

ID

Title

CVSS Score

Date Public

1

JVNDB-2008-001495

DNS cache poisoning vulnerability in multiple DNS products (in Japanese)

6.4

2008/07/23

2

JVNDB-2008-000050

Virus Security and Virus Security ZERO denial of service (DoS) vulnerability

4.3

2008/08/12

3

JVNDB-2008-000040

Directory traversal vulnerability in WebLogic Server and WebLogic Express plug-ins

5.0

2008/07/18

4

JVNDB-2008-000022

Lhaplus buffer overflow vulnerability

6.8

2008/04/28

5

JVNDB-2008-000037

Multiple Panasonic Communications Co., Ltd. network cameras vulnerable to cross-site scripting

4.3

2008/07/31

6

JVNDB-2008-000039

Safari installed in iPod touch and iPhone vulnerable in handling server certificates

2.6

2008/07/14

7

JVNDB-2008-001284

Adobe Flash Player integer buffer overflow Vulnerability (in Japanese)

6.8

2008/04/30

8

JVNDB-2007-001017

Apache HTTP Server 413 error HTTP request method cross-site scripting vulnerability (in Japanese)

4.3

2007/12/20

9

JVNDB-2008-000044

K's CGI Access Log Kaiseki (Jcode.pm) vulnerable to cross-site scripting

5.0

2008/07/23

10

JVNDB-2008-000016

Sun Java Runtime Environment (JRE) contains a vulnerability in processing XSLT transformations

6.8

2008/03/11

11

JVNDB-2008-000060

Kantan WEB Server cross-site scripting vulnerability

4.3

2008/09/17

12

JVNDB-2008-000033

Multiple Cybozu products vulnerable to cross-site request forgery

2.6

2008/06/27

13

JVNDB-2008-000036

FreeStyleWiki cross-site scripting vulnerability

4.3

2008/07/03

14

JVNDB-2008-000009

Apache Tomcat fails to properly handle cookie value

4.3

2008/02/12

15

JVNDB-2008-000038

Redmine vulnerable to cross-site scripting

4.0

2008/07/07

16

JVNDB-2008-000035

Cybozu Garoon vulnerable to arbitrary script execution

4.3

2008/06/27

17

JVNDB-2008-000056

Movable Type vulnerable to cross-site scripting

4.3

2008/09/09

18

JVNDB-2008-000017

Multiple I-O DATA DEVICE wireless LAN routers default configuration does not set authentication

7.5

2008/03/18

19

JVNDB-2008-001469

Adobe Reader and Adobe Acrobat JavaScript method remote code execution vulnerability (in Japanese)

10.0

2008/07/11

20

JVNDB-2008-001043

X.Org Foundation X server buffer overflow vulnerability

7.4

2008/01/31

 

Table 3. Top 5 Most Accessed Vulnerability Countermeasure Information From Domestic Developers

#

ID

Title

CVSS Score

Date Public

1

JVNDB-2008-001150

JP1/HIBUN encryption/decryption and removable media control malfunction problems

3.6

2008/03/14

2

JVNDB-2008-001313

JP1/Cm2/Network Node Manager denial of service vulnerability

5.0

2008/05/09

3

JVNDB-2008-001347

JP1/Cm2/Network Node Manager web coordinated function multiple vulnerabilities

7.5

2008/05/28

4

JVNDB-2008-001350

Hitachi Groupmax Collaboration products cross-site scripting vulnerability

4.3

2008/05/28

5

JVNDB-2008-001647

Jasmine WebLink template multiple vulnerabilities

7.5

2008/09/10


Note 1) Color Code for CVSS Base Score and Severity Level

CVSS Base Score
=0.0~3.9
CVSS Base Score
=4.0~6.9
CVSS Base Score
=7.0~10.0
Severity Level
=I(Low)
Severity Level
=II(Medium)
Severity Level
=III(High)


Note 2) Color Code for Published Date

Published in 2007/4Q
Published in 2008/1Q
Published in 2008/2Q
Published in 2008/3Q

 

Footnote

(*1)Japan Vulnerability Notes. A portal for vulnerability countermeasure information providing information on vendor response to the reported vulnerabilities and security support. Operated in the collaboration of IPA and JPCERT/CC.
http://jvn.jp/en/

(*2)National Vulnerability Database. A vulnerability database operated by NIST.
http://nvd.nist.gov/home.cfm

(*3)National Institute of Standards and Technology. A U.S federal agency that develops and promotes measurement, standards and technology.
http://www.nist.gov/

(*4)MITRE Corporation.
http://www.mitre.org/

(*5)How to Secure Your Web Site:
http://www.ipa.go.jp/security/english/vuln/200806_websecurity_en.html

(*6)The article on JVN iPedia’s support of CVSS v2:
http://www.ipa.go.jp/security/vuln/SeverityLevel2.html (in Japanese)

(*7)Introduction to CVSS v2:
http://www.ipa.go.jp/security/vuln/SeverityCVSS2.html (in Japanese)
A Complete Guide to the Common Vulnerability Scoring System Version 2.0:
http://www.first.org/cvss/cvss-guide.html

Contact

IT Security Center,
Information-technology Promotion Agency, Japan (ISEC/IPA)
E-mail: