HOMEIT SecurityMeasures for Information Security VulnerabilitiesIPA/ISEC:Vulnerabilities:JVN iPedia Registration Status for 2009 4Q
~Access to JVN iPedia now reached 1 million hits per month~
Feb 3, 2010
>> JAPANESE
Information-technology Promotion Agency, Japan (IPA, Chairman Koji Nishigaki) has issued a quarterly analysis report on the vulnerabilities registered to JVN iPedia, a vulnerability countermeasure information database, for the fourth quarter (October – December) of the year 2009.
JVN iPedia passed the 1 million hits per month mark in December 2009, a 5 times increase compared to the last year.
The increase accounts for the expansion of the database (with the total of 7,646 vulnerability information), and the JVN iPedia leverage tools released in the end of 2009, MyJVN Version Checker and MyJVN Security Configuration Checker.
To promote international collaboration and information sharing of vulnerability information, IPA has upped a notch on multilingualization of CVSS (vulnerability severity) Calculator, making it available now in 7 languages (Arabic, English, French, German, Japanese, Korean and Spanish).
In addition, IPA’s effort on promoting the global use of JVN iPedia is also blooming and JVN is now officially CVE-Compatible. IPA hopes that IT users continue to make the use of JVN iPedia as a portal to access vulnerability countermeasure information.
As for the characteristics of the year 2009, 5 conventional vulnerability types, such as buffer errors, resource management errors and permissions, privileges and access controls, accounted for 60 percents of the total reported cases.
Software developers should make sure to implement necessary security measures from the planning and design phase of software development.
In the 4th quarter, the vulnerability countermeasure information, such as that on DNS, Jasmine, OpenSSL, Apache Tomcat, Lhaplus and Namazu, continued to have high access counts after some time has elapsed since their initial publication.
Among the vulnerabilities published in 2009, IPv6, XML digital signature tools, Cybozu family products and SugarCRM attracted numerous access counts, illustrating user interest in information concerning these products.
In the meantime, IPA released 2 easy-to-use tools that helps IT users utilize JVN iPedia, namely MyJVN Version Checker(*1), a tool to check the version of software applications installed, and MyJVN Security Configuration Checker(*2), a tool to assess the Windows security configuration.
These led to JVN iPedia reaching the mark of the 1 million hits per month in December 2009, a 5 times increase compared to the last year. IPA hopes that IT users continue to make the use of JVN iPedia as a portal to access vulnerability countermeasure information.
The vulnerability countermeasure information registered to the Japanese version of JVN iPedia in the 4th Quarter of 2009 (October 1, 2009 to December 31, 2009) totaled 351 cases (cumulative total of 7,646 cases).
Those gathered from domestic developers were 2 cases (cumulative of 85 cases from the start of JVN iPedia), 26 cases were gathered from JVN (724 cumulative cases), and 323 cases from NVD (6,837 cumulative cases); bringing the quarterly total to 351 cases (7,646 cumulative cases) (Table 1, Figure 1).
In the English version of JVN iPedia, 2 cases were gathered from domestic developers (85 cumulative cases) and 16 from JVN (413 cumulative cases) for a quarterly total of 18 cases (498 cumulative cases).
Information Source | 2009 4Q | Total Sum | |
---|---|---|---|
Japanese Version | Domestic Developers | 2 |
85 |
JVN | 26 |
724 |
|
NVD | 323 |
6,837 |
|
Total | 351 |
7,646 |
|
English Version | Domestic Developers | 2 |
85 |
JVN | 16 |
413 |
|
Total | 18 |
498 |
Common Vulnerability Scoring System (CVSS(*3)) is a vendor-independent vulnerability rating system designed to provide an open and standardized method for rating information system vulnerabilities.
By using CVSS, the severity of vulnerabilities can be quantitatively compared under the one single common standard. Also the relevant parties, such as vendors, security experts, system administrators and end users, can talk about vulnerability in a common language.
JVN iPedia supports CVSS and provides the CVSS Base Scores, which represent the inherent characteristics of each vulnerability.
With JVN iPedia CVSS Calculator, end users can calculate the CVSS Temporal Score (based on information such as exploitability and remediation level) and the CVSS Environmental Score (target distribution and damage potential) to help decide whether to respond to the vulnerability.
To promote international collaboration and information sharing of vulnerability information with the oversea Computer Security Incident Response Teams (CSIRTs), software developers and end users, IPA moved forwarded with the multilingualization of CVSS (vulnerability severity) Calculator.
In addition to English and Japanese, it is now provided in Arabic, French, German, Korean and Spanish (listed in alphabetical order), making it available in the total of 7 languages.
The new multilingual CVSS Calculator (Figure 2) is available at the following URL:
http://jvndb.jvn.jp/en/cvss/index.html (English Top Page)
http://jvndb.jvn.jp/cvss/index.html (Japanese Top Page)
Common Vulnerabilities and Exposures (CVE)(*4) is a unique-identifier numbering system on vulnerabilities in IT products run by MITRE, a non-profit organization, with the support of the U.S. government.
It was launched in 1999 and has marked 10 years of operation. Many of the vulnerability checking tools and vulnerability advisory services use CVE.
Through the formal CVE compatibility evaluation process, MITRE approved that CVE identifiers are adequately implemented in JVN, JVN iPedia and MyJVN, and IPA is pleased to announce that JVN, JVN iPedia and MyJVN are now officially CVE-Compatible.
http://www.cve.mitre.org/news/index.html#jan082010a
With the CVE Compatibility, people can use JVN globally, for example, to search vulnerability information by CVE IDs and to check if different vulnerability advisories are talking about the same vulnerability.
IPA plans to go forward with the adoption of common standards, promoting the domestic and international flow of vulnerability countermeasure information and maintaining and improving upon the infrastructure that helps IT users take objective and efficient countermeasures against security vulnerabilities.
Common Weakness Enumeration (CWE)(*5) is a hierarchically structured list of weakness types to help identifying software vulnerabilities.
Using CWE, people can identify and analyze the kinds of vulnerability (weakness types) that come in a wide variety, such as SQL injection, cross-site scripting and buffer overflow, and compare the vulnerabilities globally.
JVN iPedia uses CWE to identify the types of vulnerability. Figure 3 illustrates the annual changes in the types of vulnerability analyzed from the vulnerability countermeasure information registered to JVN iPedia.
Following the year 2008, 5 types of vulnerabilities, CWE-119 (Buffer Errors), CWE-399 (Resource Management Errors), CWE-264 (Permissions, Privileges and Access Controls), CWE-79 (Cross-Site Scripting), CWE-20 (Improper Input Validation), accounted for 60 percent of the total reported cases.
Among the vulnerabilities, CWE-79 (Cross-Site Scripting), CWE-20 (Improper Input Validation) and CWE-94 (Code Injection) are expanding their ratio. Most of these are well-known types of vulnerabilities.
Software developers should refer to the IPA guidelines that address these vulnerabilities, such as “How to Secure Your Web Site(*6)” and the “Secure Programming Course(*7)”, to make sure to implement necessary security measures from the planning and design phase of software development.
JVN iPedia( http://jvndb.jvn.jp/en ) is endeavoring to become a comprehensive database where vulnerability countermeasure information for software products used within the country of Japan is gathered.
JVN iPedia has collected and conducted translations on the vulnerability countermeasure information made public by (1)domestic software developers, (2)JVN(*8), a vulnerability information portal site, and (3)NVD(*9), a vulnerability information database run by National Institute of Standards and Technology (NIST)(*10).
JVN iPedia has continued to make these information available to the public since April 25, 2007.
Figure 4 illustrates the number of vulnerability countermeasure information registered during the 4th quarter, sorted by their vulnerability type using CWE.
The types of vulnerabilities that have been reported a lot are CWE-119 (Buffer Errors) with 52 cases, CWE-399 (Resource Management Errors) with 30 cases, CWE-264 (Permissions, Privileges, and Access Controls) with 25 cases, CWE-94 (Code Injection) with 23 cases, CWE-189 (Numeric Errors) with 21 cases, CWE-20 (Insufficient Input Validation) with 19 cases and CWE-310 (Cryptographic Issues) with 15 cases. Most of these are well-known types of vulnerabilities.
Software developers should refer to the IPA guidelines that address these vulnerabilities, such as “How to Secure Your Web Site(*6)” and the “Secure Programming Course(*7)”, to make sure to implement necessary security measures from the planning and design phase of software development.
Figure 5 shows the annual transitions in the severity of vulnerabilities registered to JVN iPedia based on the date they were first made public by product developers or by other means like security portal sites.
The publication of vulnerability countermeasure information has increased dramatically since 2004, and continued to show an increasing tendency through 2008.
JVN iPedia rates each vulnerability according to the CVSS(*3) and publishes its severity level(*11).
As of the 4th quarter 2009 (January - December), 44 percent of the vulnerabilities were labeled level “High” (CVSS Base Score = 7.0-10.0), 50 percent were labeled level “Medium” (CVSS Base Score = 4.0-6.9) and 6 percent were level “Low” (CVSS Base Score = 0.0-3.9).
Considering the vast number of published vulnerabilities at high severity levels, it is essential for product users to check vulnerability information on a daily basis; updates and security patches concerning the product in question should be applied without delay.
Figure 6 shows the annual transitions in the type of software products registered to JVN iPedia for having vulnerabilities, based on their respective publication dates.
Publication of vulnerability countermeasure information is increasing annually for application software, including desktop applications such as Internet Explorer, Firefox, Microsoft Office, middleware products such as web servers, application servers, databases, and development/management platforms such as PHP, Java, and GNU libraries.
Since many new applications are developed each year and they are still accompanied by old and new vulnerabilities, improving security measures concerning application software should be of especially high priority.
Regarding OS such as Windows, Mac OS, UNIX, and Linux, the number of published vulnerabilities initially had had an increasing trend, but the number has dropped off as of 2005.
This is due to the fact that even though new vulnerabilities are discovered each year, vulnerability countermeasures concerning OS are implemented promptly in the subsequent product.
Around the year 2005, vulnerabilities in embedded software products like intelligent home appliances, such as network devices, cell phones, and DVD recorders, have slowly proceeded to become published.
In addition, around the year 2008, vulnerabilities in Supervisory Control And Data Acquisition (SCADA) systems used in critical infrastructure have been reported as well. 6 vulnerabilities were published during 2008 and 9 during 2009.
Figure 7 shows the annual transitions in JVN iPedia registered vulnerabilities found in open source software (OSS) and non-OSS based on the date they were first made public. 30 percent of the vulnerabilities registered are of OSS and 70 percent are of non-OSS.
From an annual perspective concerning the OSS to non-OSS ratio, OSS had had a successively upward trend from 1998 to 2003, but after marking its highest point in 2003, the ratio of OSS has demonstrated a decreasing trend.
Figure 8 and 9 illustrate the breakdown of software developers (vendors) registered on JVN iPedia, with Figure 8 representing OSS vendors and Figure 9 representing non-OSS vendors.
As shown in Figure 8, the registered OSS vendors consist of 57 domestic vendors, 21 foreign vendors with Japan office, and 216 foreign vendors without office in Japan; cumulative of 294 vendors.
Similarly, as Figure 9 represents, the 202 registered non-OSS vendors consist of 105 domestic vendors, 58 foreign vendors with office in Japan, and 39 foreign vendors without office in Japan.
In the case of OSS vendors, a vast amount of vulnerability countermeasure information is registered from foreign vendors without office in Japan.
When using OSS, if product users do not have the proper knowledge required to update software to the latest version or to apply security patches, it is necessary to take contract agreements for support into account and/or the use of product support services provided by the vendor.
Table 2 lists the top 20 most accessed vulnerability countermeasure information in the JVN iPedia database during the 4th quarter of 2009.
Vulnerability countermeasure information where some time has elapsed since the date they were first published, such as that on DNS, OpenSSL, Apache Tomcat, Lhaplus and Namazu, still marked high access counts, illustrating continuous user interest in information on these products.
Among the recently released vulnerability information, IPv6, Cybozu and PHP software also attracted a large number of access counts.
Table 3 lists the top 5 vulnerability countermeasure information accessed among those reported by domestic product developers.
Table 2. Top 20 Most Accessed Vulnerability Countermeasure Information in JVN iPedia
# |
ID |
Title |
Access |
CVSS |
Date |
---|---|---|---|---|---|
1 |
JVNDB-2008-001495 |
DNS cache poisoning vulnerability in multiple DNS products (in Japanese) |
2,066 |
6.4 |
2008/7/23 |
2 |
JVNDB-2009-000068 |
Implementations of IPv6 may be vulnerable to denial of service (DoS) attacks |
1,308 |
5.7 |
2009/10/26 |
3 |
JVNDB-2008-001647 |
1,147 |
7.5 |
2008/9/10 |
|
4 |
JVNDB-2005-000601 |
1,099 |
2.6 |
2007/4/1 |
|
5 |
JVNDB-2008-000009 |
996 |
4.3 |
2008/2/12 |
|
6 |
JVNDB-2008-000022 |
979 |
6.8 |
2008/4/28 |
|
7 |
JVNDB-2008-000018 |
916 |
4.3 |
2008/3/21 |
|
8 |
JVNDB-2009-001911 |
XML Digital Signature Authentication Bypass Vulnerability (in Japanese) |
913 |
5.0 |
2009/8/20 |
9 |
JVNDB-2009-000067 |
841 |
2.6 |
2009/10/15 |
|
9 |
JVNDB-2008-001150 |
JP1/HIBUN Encryption/Decryption and Removable Media Control Malfunction Problems |
841 |
3.6 |
2008/3/14 |
11 |
JVNDB-2008-001043 |
838 |
7.4 |
2008/1/31 |
|
12 |
JVNDB-2009-000065 |
835 |
2.6 |
2009/10/2 |
|
13 |
JVNDB-2008-000084 |
833 |
2.6 |
2008/12/19 |
|
14 |
JVNDB-2008-000050 |
Virus Security and Virus Security ZERO denial of service (DoS) vulnerability |
823 |
4.3 |
2008/8/12 |
15 |
JVNDB-2008-000055 |
796 |
2.6 |
2008/9/1 |
|
16 |
JVNDB-2007-001017 |
Improper HTTP method examination for Apache HTTP Server 413 Error Message (in Japanese) |
773 |
4.3 |
2007/12/20 |
17 |
JVNDB-2009-000064 |
Directory traversal vulnerability in multiple phpspot products |
763 |
5.0 |
2009/9/18 |
18 |
JVNDB-2008-001313 |
JP1/Cm2/Network Node Manager Denial of Service Vulnerability |
760 |
5.0 |
2008/5/9 |
19 |
JVNDB-2009-000037 |
757 |
4.3 |
2009/6/18 |
|
20 |
JVNDB-2007-000819 |
Cross-site scripting vulnerability in Apache HTTP Server "mod_imap" and "mod_imagemap" |
752 |
4.3 |
2007/12/13 |
Table 3. Top 5 Most Accessed Vulnerability Countermeasure Information From Domestic Developers
# |
ID |
Title |
Access |
CVSS |
Date |
---|---|---|---|---|---|
1 |
JVNDB-2008-001647 |
1,147 |
7.5 |
2008/9/10 |
|
2 |
JVNDB-2008-001150 |
JP1/HIBUN Encryption/Decryption and Removable Media Control Malfunction Problems |
841 |
3.6 |
2008/3/14 |
3 |
JVNDB-2008-001313 |
JP1/Cm2/Network Node Manager Denial of Service Vulnerability |
760 |
5.0 |
2008/5/9 |
4 |
JVNDB-2008-001895 |
JP1/VERITAS NetBackup JAVA Administration GUI Privilege Escalation Vulnerability |
616 |
6.5 |
2008/11/26 |
5 |
JVNDB-2008-001350 |
Hitachi Groupmax Collaboration Products Cross-Site Scripting Vulnerability |
445 |
4.3 |
2008/5/28 |
Note 1) Color Code for CVSS Base Score and Severity Level
CVSS Base Score =0.0~3.9 |
CVSS Base Score =4.0~6.9 |
CVSS Base Score =7.0~10.0 |
Severity Level =Low |
Severity Level =Medium |
Severity Level =High |
Note 2) Color Code for Published Date
Published in 2007 |
Published in 2008 |
Published in 2009 |
(*1)Released on November 30, 2009.
http://www.ipa.go.jp/security/english/vuln/200911_myjvn_vc_en.html
(*2)Released on December 21, 2009.
http://www.ipa.go.jp/security/english/vuln/200912_myjvn_cc_en.html
(*3)Common Vulnerability Scoring System (CVSS) Summary:
http://www.ipa.go.jp/security/vuln/CVSS.html (in Japanese)
A Complete Guide to the Common Vulnerability Scoring System Version 2.0:
http://www.first.org/cvss/cvss-guide.html (FIRST - Forum of Incident Response and Security Teams)
(*4)Common Vulnerabilities and Exposures. A standard, unique-identifier numbering system on vulnerabilities, providing a list of CVE-IDs for each vulnerability. For more information, refer to “CVE (Common Vulnerabilities and Exposures) Overview”:
http://www.ipa.go.jp/security/english/vuln/CVE_en.html
(*5)Refer to “CWE (Common Weakness Enumeration) Overview”:
http://www.ipa.go.jp/security/english/vuln/CWE_en.html
(*6)How to Secure Your Web Site:
http://www.ipa.go.jp/security/english/vuln/200806_websecurity_en.html
(*7)Secure Programming Course (in Japanese):
http://www.ipa.go.jp/security/awareness/vendor/programmingv2/index.html
(*8)Japan Vulnerability Notes. A portal for vulnerability countermeasure information providing information on vendor response to the reported vulnerabilities and security support. Operated in the collaboration of IPA and JPCERT/CC.
http://jvn.jp/en/
(*9)National Vulnerability Database. A vulnerability database operated by NIST.
http://nvd.nist.gov/home.cfm
(*10)National Institute of Standards and Technology. A U.S federal agency that develops and promotes measurement, standards and technology.
http://www.nist.gov/
(*11)Transition to the New Version of Vulnerability Severity Scoring System CVSS v2. CVSS (Common Vulnerability Scoring System).
http://www.ipa.go.jp/security/vuln/SeverityLevel2.html (in Japanese)
IT Security Center,
Information-technology Promotion Agency, Japan (ISEC/IPA)
E-mail: