The Importance of Patching Non-Microsoft Applications



Similar documents
Tackling Third-Party Patches

A Best Practice Approach to Third Party Patching

Closing the Vulnerability Gap of Third- Party Patching

Patch Management Solutions Test

CA Client Automation: Patch Manager - Supported Patches

Patch management: Fixing vulnerabilities before they are exploited

Five Tips to Reduce Risk From Modern Web Threats

VMware vcenter Support Assistant 5.1.1

IBM Security re-defines enterprise endpoint protection against advanced malware

Vulnerability Scanning and Patch Management

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Dupaco Cafe Secure your business Your time is valuable how F-Secure can help you make the most out of it

Protecting Your Organisation from Targeted Cyber Intrusion

Complete Patch Management

Fast and Effective Migration from Novell to Windows Active Directory with VMware Mirage WHITE PAPER

Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE

What s New in VMware vsphere 5.1 VMware vcenter Server

vrealize Hyperic Supported Configurations and System Requirements

CA Client Automation

Managing non-microsoft updates

Priority One: Client-side software that remains unpatched. Priority Two: Internet-facing web sites that are vulnerable.

Invincea Advanced Endpoint Protection

WHY PATCH MANAGEMENT MATTERS

The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director

Secunia Vulnerability Review

End Your Data Center Logging Chaos with VMware vcenter Log Insight

Upgrading Horizon Workspace

Study Shows Businesses Experience Significant Operational and Business Benefits from VMware vrealize Operations

Comparing VMware Zimbra with Leading and Collaboration Platforms Z I M B R A C O M P E T I T I V E W H I T E P A P E R

Miradore Management Suite Application support for Patch Management

What s New in VMware vcenter 5.0

Endpoint Business Products Testing Report. Performed by AV-Test GmbH

ThinPrint GPO Configuration for Location-Based Printing

Why should I care about PDF application security?

HIPAA/HITECH Compliance Using VMware vcloud Air

Helping Customers Move Workloads into the Cloud. A Guide for Providers of vcloud Powered Services

Optimizing Virtualization Management with Automated Application Discovery

EXTENSIVE FEATURE DESCRIPTION SECUNIA CORPORATE SOFTWARE INSPECTOR. Non-intrusive, authenticated scanning for OT & IT environments. secunia.

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks

Simplifying the Challenges of Mobile Device Security

The cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL.

CORPORATE AV / EPP COMPARATIVE ANALYSIS

Selecting the right cybercrime-prevention solution

VMware vcenter Log Insight Getting Started Guide

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox

Accelerate Patching. the Enterprise. Wolfgang Kandek Qualys, Inc. Session ID: STAR-301 Session Classification: Intermediate

VMware vcenter Configuration Manager and VMware vcenter Application Discovery Manager Integration Guide

Practical Patch Compliance

Why The Security You Bought Yesterday, Won t Save You Today

VMware Cloud Adoption Study

vcloud Automation Center Support Matrix vcloud Automation Center 5.1

things you haven t done to protect your business from cybercrime

TECHNICAL REQUIREMENTS

CA Productivity Accelerator v :

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Accelerate Patching Progress in the Enterprise. Wolfgang Kandek CTO Qualys, Inc.

Virtualization Essentials

Client System Requirements for Brainloop Secure Dataroom as of Version 8.30

Three Ways to Secure Virtual Applications

PCI DSS Requirement Installed Security Updates by Host Report

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Implementing Cloud Solutions Within Your Existing IT Environment. White paper

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER

What you need to know to keep your computer safe on the Internet

vcloud Automation Center Support Matrix vcloud Automation Center 5.2

Server and Storage Sizing Guide for Windows 7 TECHNICAL NOTES

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Minimum Computer System Requirements

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER

The Smart Disaster Recovery Strategy for Your Workforce: Cloud-Hosted Desktops WHITE PAPER

The Power of Partnership

Supported Platforms May 2013

Transcription:

The Importance of Patching Non-Microsoft Applications Technical WHITE PAPER

The Importance of Patching Non-Microsoft Applications In the past, organizations patched only Microsoft operating systems. As time passed, the need to patch applications such as Microsoft Office and Internet Explorer became obvious, and organizations responded. However, in recent years, third-party applications have become the primary attack vector for new malware, and organizations haven t been as quick to apply security updates to these applications. Many organizations are at a point where addressing these security threats is no longer optional. What follows is a brief summary of research findings to consider when determining whether an organization can accept the risk of delaying third-party application patching. Gartner and the Importance of Patching Third-Party Software IT organizations must strive for continuous improvement in vulnerability detection and rapid security patch management, especially in often overlooked non-microsoft components that are Web-facing. Unpatched vulnerabilities are the primary infection method of targeted and mass-propagation threats. Deployment of non- Microsoft patches is often significantly slower and less organized. All Internet-based applications, especially browsers and browser plug-ins (i.e., Adobe and Apple QuickTime), should be a top patching priority. SANS Institute: Top Cyber Security Risks Client-Side Software Is Primary Attack Vector In September 2009, the SANS Institute indicated that unpatched client applications are the number one security threat. Waves of targeted email attacks, often called spear phishing, are exploiting client-side vulnerabilities in commonly used programs such as Adobe Reader, Apple QuickTime, Adobe Flash and Microsoft Office. This is the primary initial infection vector used to compromise computers that have Internet access. Those same clientside vulnerabilities are exploited by attackers when users visit infected websites. Read the full report here: http://www.sans.org/top-cyber-security-risks/summary.php Real-Life HTTP Client-Side Exploitation Example from SANS Institute Acme Widgets Corporation suffered a major breach from attackers who were able to compromise their entire internal network infrastructure using two of the most powerful and common attack vectors today: exploitation of client-side software and pass-the-hash attacks against Windows machines. Learn more about the attack at http://www.sans.org/top-cyber-security-risks/tutorial.php Software Flaws, Delayed Patching Third-party software programs, such as Adobe Reader and Mozilla Firefox, are known to be responsible for the steady increase in the number of software vulnerabilities affecting computer users. The total number of vulnerabilities affecting a typical end user is expected to reach close to 800 in 2011, which is an increase of more than 200 percent since 2008. During just the first half of 2011, an average user had seen 90 percent of the total number of bugs that were seen in all of 2010. The precipitous rise in vulnerabilities is attributable to researchers and criminals increasing their focus on third-party applications. TECHNICAL WHITE PAPER / 2

Third-Party Applications Seen as Biggest Security Risk Contrary to popular belief, Apple leads the pack when it comes to the number of security vulnerabilities, ahead of both Microsoft and Adobe. The number of reported vulnerabilities in major commercial software products is accelerating. Perhaps more important, though, is the fact that third-party applications now account for the vast majority of flaws on most computers. In addition, although Apple products have the highest number of vulnerabilities, Microsoft, Adobe, Mozilla and Oracle are right in the mix, as well. This alarming development in third-party program vulnerabilities represents an increasing threat to both users and businesses a threat that continues to be greatly ignored. Users and businesses still perceive operating systems and Microsoft products to be the primary attack vector and largely ignore third-party programs. The perception is that finding ways to secure these products is too complex and time-consuming. Ultimately, this leads to incomplete patch levels of third-party programs, often presenting rewarding and effective targets for criminals. Top 15 Most Vulnerable Applications Which were the most vulnerable applications in the first half of 2010? Below are the conclusions drawn from vulnerability data feeds through July 7, 2010 from the National Vulnerability Database (NVD), the U.S. government repository of standards-based vulnerability management data. According to the NVD, new security vulnerabilities are published at a rate of 16 per day. Vendors are forced to release many security updates to keep their products secure. Number of Vulnerabilities by Severity Application Total Hi Medium Low Score Apple Safari 81 2 71 8 413 Mozilla Firefox 44 3 30 11 236 Google Chrome 61 1 30 30 205 Microsoft Internet Explorer 34 1 30 3 178 Adobe Flash Player 34 0 34 0 170 Adobe Reader 34 0 34 0 170 Java Runtime Environment 28 5 5 18 168 Adobe Acrobat 32 0 32 0 160 Adobe Air 28 0 28 0 140 Mozilla SeaMonkey 26 1 20 5 130 Microsoft Office 22 0 22 0 110 Mozilla Thunderbird 18 1 14 3 98 Adobe Shockwave Player 18 0 18 9 90 Oracle Database Server 9 30 0 0 81 Microsoft Visio 3 3 0 0 75 Table 1: Top Threats of 2010 Source: National Vulnerabiity Database TECHNICAL WHITE PAPER / 3

Vulnerable Browsers: Web browsers are the most targeted applications. They hold the top four places in the NVD s list of vulnerable applications. Other popular targets for hackers are Adobe products, Java Runtime Environment and Microsoft Office. Discussions about which browser is most secure do not make much sense; they all have new security vulnerabilities. A safe Web browser is one that is used by only a few people and therefore is not popular enough to get attention from hackers. However, on such a browser, many sites will not work simply because most developers test their sites on the most popular browsers. TECHNICAL WHITE PAPER / 4

VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com Copyright 2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item No: VMW_11Q4_TECH_WP_Patching-Non-MS-Apps_EN-102