When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Mishandled patch trips security alarms

The questionable handling of a fix for a recent widespread software vulnerability has some administrators worried that developers can't be trusted to make security a top priority. Last week, the Internet Software Consortium withheld the patch for a critical flaw in the domain name system (DNS) software from a large number of researchers, asking instead that each person send the organization an e-mail request in order to get the fix. The software, known as the Berkeley Internet Name Domain (BIND) program, performs a critical function as the address book for the Net.

The delay, coupled with messages sent to several administrators urging them to pay to become part of an early-warning group run by the ISC, has some security experts worried that security is taking a back seat to secrecy and money.

"It's a concern, especially with the Digital Millennium Copyright Act being used by some companies to threaten researchers," said Greg Shipley, chief technology officer of security consultancy Neohapsis. "The bottom line is the industry cannot agree on a responsible disclosure process, and the community and the Internet at large suffer."

For the past two years, Richard Clarke, special presidential adviser for cybersecurity, has expounded the need for software companies and developers to understand that the country's national security could rely on how responsibly software vulnerabilities, and their fixes, are handled.

View: The full story

News source: ZDNet

Report a problem with article
Next Article

ISPs must learn from Sept. 11

Previous Article

Zelda bonus disk madness