Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Networking

    Caught in a (Real) Security Bind

    Written by

    Ryan Naraine
    Published January 31, 2008
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      More than a month ago, on Dec. 16, 2007, a Russian security research firm released an exploit for a zero-day vulnerability in RealNetworks’ RealPlayer software into a subscription-only exploit package. The vulnerability, which still exists in the most up-to-date version of the cross-platform media player, is still unpatched because RealNetworks has been unable to get data on the bug from the creator of the exploit.

      Gleg, one of a handful of legitimate companies that create and sell information on software flaws and exploits, has released of video of the exploit in action as a tease of its availability but, despite repeated pleas from high-level officials at RealNetworks and the Carnegie Mellon Software Engineering Institute CERT/CC (Computer Emergency Response Team), has refused to share details on the bug.
      “We’re just hoping we can get the information to investigate and determine if it’s legitimate,” says RealNetworks Vice President Jeff Chasen. “We’ve repeatedly asked Gleg to share basic details [of the vulnerability] to help us get it fixed but they said they needed more time. We’ve done all we can to track down this issue.”

      Without access to the information, Chasen says it’s impossible to figure out if there’s something to fix and because of the severity of Gleg’s claim, the company is nervous that the information might leak out to the general public and put millions of its customers at risk.
      The Gleg exploit is legitimate and described as “very serious” by an IT administrator with access to the company’s VulnDisco exploit pack. “Basically, you play a corrupted song file in RealPlayer, you’re owned. It’s that serious,” he said, requesting anonymity for confidentiality reasons.

      To read more about the zero-day exploit in the RealPlayer software, click here

      RealNetworks isn’t the first big-name vendor to find itself at the mercy of security researchers looking to cash in on the burgeoning market for software vulnerabilities. Third-party companies like VeriSign’s iDefense and 3Com’s TippingPoint have created business models around buying and brokering flaw information and there have been reports of extortion-like attempts at getting companies to pay directly for bug findings.Gleg founder Evgeny Legerov confirmed his company’s refusal to share the RealPlayer exploit details, arguing that he needs “exclusivity” for a few months to help his customers understand the level of risk they face.”We tried to work with vendors in the past and and received a very negative experience,” Legerov said in an instant messaging exchange with eWEEK. “So right now, the answer is no, we’re not sharing [with RealNetworks]. We need an exclusive time period to protect our customers.”Legerov said his customers pay for access to exploits to do things like study bad programming practice, create IDS (intrusion detection system) signatures and scan networks to look for holes that hackers can use to attack networks.

      Should companies subscribe to exploit packs?

      He described RealPlayer as a “very buggy piece of software,” claiming the company has two more exploitable flaws in its pocket. “Our customers need to understand that RealPlayer is a real risk,” Legerov argued.

      Dave Aitel, founder and vulnerability researcher at Immunity, believes companies like RealNetworks should subscribe to commercial exploit packs. “It’s a drop in the bucket for them,” Aitel said, noting that access to exploits can take a lot of exploitable bugs off the table.

      Immunity, like Gleg, ships exploits to paying subscribers in its CANVAS penetration testing platform and Aitel argues that software vendors should recognize the value of embracing third party research as part of the security development lifecycle. Immunity does not share its findings with affected vendors.

      Over at Carnegie Mellon’s CERT/CC, vulnerability analyst Chad Dougherty is worried that Gleg’s silence will leave millions of computers users exposed to hacker attacks for a long time.

      “We’ve seen this trend develop for a while, where vendors are at the mercy of hackers. In some cases, it gets the information flowing directly to the affected vendor but in cases like this, it’s the end user who suffers,” Dougherty said in an interview.

      “For the situation to improve for end users, legitimate users of those commercial exploit kits need to start demanding that the companies that sell them allow users to interact with affected vendors. If you buy these exploit packs for a legitimate reason, you should be demanding some contractual or legal right to contact the affected vendor to get the issue fixed,” he added.

      Dougherty’s unit has also tried in vain to get details on the RealNetworks issue from Gleg. “We’d like to see the issue get fixed. We don’t get into the politics of disclosure. Our objective is to get the information flowing in a way that end users are protected.”

      Ryan Naraine
      Ryan Naraine

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×