con7403 – ‘heartbleed’ (cve-2014-0160) case study ii vulnerability handling perspective bruce...

24

Upload: suzanna-mckinney

Post on 17-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice
Page 2: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study IIVulnerability Handling Perspective

Bruce Lowenthal – Senior Director, Security AlertsEric Maurice – Director, Oracle Security Assurance

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |

Page 3: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 3

Program Agenda

What is the ‘Heartbleed’ SSL vulnerability?

How did the disclosure took place?

Implications for vulnerabilities in 1/3rd party components?

What are the lessons learned?

What lessons can YOU derive for YOUR organization?

1

2

3

4

5

Page 4: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 4

Preliminary Remarks• Today’s discussion came about as a unique opportunity• We believe that any organizations can derive significant lessons from

‘Heartbleed’: – Secure development practices (see previous presentation)– Implications for dealing with vulnerabilities in third party components– Implications related to uncoordinated disclosure

• This presentation is the second of a 2-part session:– Heartbleed case study I: Secure Development Perspective – (Was on Wed. Oct. 1)– Heartbleed case study II: Vulnerability Handling Perspective – NOW

Page 5: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 5

Program Agenda

What is the ‘Heartbleed’ SSL vulnerability?

How did the disclosure took place?

Implications for vulnerabilities in 1/3rd party components?

What are the lessons learned?

What lessons can YOU derive for YOUR organization?

1

2

3

4

5

Page 6: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 6

CVE-2014-0160 a.k.a. Heartbleed

• A vulnerability affecting certain versions of the OpenSSL TLS libraries:–OpenSSL 1.0.1 through 1.0.1f (inclusive) are vulnerable

• A successful exploitation can result in allowing malicious attacker with the ability to remotely (over the Internet) read (sections of) the memory of the targeted system:– Possible compromise of secret keys and other sensitive information

• It was called ‘Heartbleed’ because the bug originated n the OpenSSL's implementation of the TLS/DTLS (transport layer security protocols) heartbeat enhancement

What is it?

Page 7: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 7

• Tremendous visibility in the press and security community resulted in quick response• The vulnerability was limited to only

certain versions of OpenSSL• The common use of TLS termination

proxy (particularly with large sites) which used older versions of the library or didn’t use SSL provided some level of mitigation against successful exploitation

Why didn’t the world come to an end?

Source: http://xkcd.com/1353/

Page 8: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 8

• Large number of systems may be left vulnerable. Only about half affected Internet servers applied fixes after 3 months• Sites that have applied OpenSSL

April fixes have not all re-issued certificates and/or invalidated passwords

…But we have to remain vigilant

Source: http://www.csoonline.com/article/2466726/data-protection/heartbleed-to-blame-for-community-health-systems-breach.html

Page 9: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 9

Program Agenda

What is the ‘Heartbleed’ SSL vulnerability?

How did the disclosure took place?

Implications for vulnerabilities in 1/3rd party components?

What are the lessons learned?

What lessons can YOU derive for YOUR organization?

1

2

3

4

5

Page 10: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 10

Lack of coordinated disclosure was a problem• Heartbleed was essentially made public on April 7th without notice to either

the hundreds of thousands of vulnerable sites or to the vendors of products running on those sites• Vendors scrambled to determine which products were vulnerable because

many, probably most, did not have OpenSSL use records that could be easily queried• After determining vulnerable sites and products, fixes had to be created,

tested and distributed• Three months later, product fixes are still being released• Customers could not apply fixes for a considerable time

Page 11: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 11

Oracle ResponseTimeline

01Apr2014: Vulnerability discovered

07Apr2014: OpenSSL fix released and

Oracle learned of issue09Apr2014: eMail to all Oracle

SPOCs;MOS note published;Updates multiple times daily

14Apr2014: Note moved to Oracle.com

18Apr2014: eMail sent to all customers

29Apr2014: Fixes available for all Oracle products

- except 1 OEM product)

My Oracle Support and Oracle.com Online Reports

• 1,200 Service Requests• Issue: Product Names• Provided info for any requested product• Five product status tables (counts final)• Include OpenSSL, not vulnerable

(136)• Under investigation

(0)• Fixes available

(20)• Awaiting fixes

(0)• Do not include OpenSSL

(244)

Page 12: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 12

Program Agenda

What is the ‘Heartbleed’ SSL vulnerability?

How did the disclosure took place?

Implications for vulnerabilities in 1/3rd party components?

What are the lessons learned?

What lessons can YOU derive for YOUR organization?

1

2

3

4

5

Page 13: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 13

• For open source, the gloves are off• Huge leverage for vulnerabilities

found in commonly included 3rd party components• Common tools indicating included

3rd party components available• Compounded by ease of use of

“Weaponizing” facilities such as MetaSploit

Enhanced focus of hackers against third-party libraries

Source: http://threatpost.com/third-party-software-library-risks-to-be-scrutinized-at-black-hat

Page 14: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 14

Lack of coordinated disclosure mechanism • There is little pro-active communication regarding vulnerabilities in 3rd party

embedded components• There are thousands of embedded 3rd party components• Compounded by abandoned support for many 3rd party components– Example: Apache Attic: Struts1, Jakarta, Shale, XML Beans, ….

Page 15: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 15

Cost of security ownership of 3rd party products• 3rd party products are used to reduce development costs• Support costs may be reduced– But … support is not free -- as is often “planned”– Fixes delayed or support abandoned– Fixes issued unpredictably and possibly frequently

• For example, OpenSSL:– August 6, 2014: 1.0.1i– Jun e 5, 2014: 1.0.1h – April 7, 2014: 1.0.1g– January 6, 2014 :1.0.1f– February 11, 2013: 1.0.1e

– February 5, 2013: 1.0.1d– May 10 ,2012: 1.0.1c– April 26, 2012: 1.0.1b– April 19, 2012: 1.0.1a– March 14, 2012: 1.0.1

Page 16: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 16

Program Agenda

What is the ‘Heartbleed’ SSL vulnerability?

How did the disclosure took place?

Implications for vulnerabilities in 1/3rd party components?

What are the lessons learned?

What lessons can YOU derive for YOUR organization?

1

2

3

4

5

Page 17: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 17

Providing Security with Included 3rd Party Products• Development: Only include Supported 3rd party products– Through life of product (or make other plans for support)– Criteria: Fixes released at least once/year for last five years and no de-support notice?– Provide adequate staffing

• Development: Migration plans when products become de-supported– E.g. Struts 1 to some other facility

• Sustaining: Plan for frequent updates– Fast fix distribution with quick deployment in a form acceptable for customers

Page 18: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 18

Difficulties faced by some vendors related to the use of third-party components in their products• Lack of 3rd party component tracking in products– For both product versions and 3rd party component versions–Many large vendors spent considerable time “investigating” 3rd party component use

• Lack of notification infrastructure when fixes are released– Heartbleed was widely publicized but OpenSSL June and August releases were not

• Lack of notification when 3rd party components become de-supported– No automation–Many times there is no de-support notice

• Replacement of support-abandoned 3rd party components often expensive

Page 19: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 19

‘Heartbleed’ lessons for Oracle• Although Oracle provided timely information about CVE-2014-0160:– Need more automation to quickly detect fix releases for 3rd party components– Need to improve ease of patch application– 3rd party component fix distributions not coordinated with Oracle fix schedule

• Oracle is considering new criteria for third party component inclusion:– Likelihood 3rd party embedded components are really supported for life of product?– Frequency of security fix releases (Too many, too delayed, too few)?– Ease of patching (e.g. forward compatibility enhancement policies)?

• Criteria for publishing “5 tables”–Must be Security Alert worthy (Attacks in progress or expected imminently) –Otherwise: Case by case basis

Page 20: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 20

Program Agenda

What is the ‘Heartbleed’ SSL vulnerability?

How did the disclosure took place?

Implications for vulnerabilities in 1/3rd party components?

What are the lessons learned?

What lessons can YOU derive for YOUR organization?

1

2

3

4

5

Page 21: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 21

Key take-away actions1. Open Source code is now under attack especially because discovered

vulnerabilities can be leveraged against a great number of products– It was estimated that 17% of Internet servers were vulnerable to Heartbleed– Successful Heartbleed exploits occurred within three weeks of fix distribution– Users need to be quickly alerted when fixes are released and apply fixes in a timely

manner

2. Make sure all deployed products and their components are supported– 3rd party components often go out of support without notice– Many 3rd party components do not have a policy of forward compatibility– Take great care in determining with 3rd party components are used

Page 22: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 22

Key take-away actions (cont’d)

• Comments, concerns, questions?– [email protected]

Page 23: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 23

Page 24: CON7403 – ‘Heartbleed’ (CVE-2014-0160) Case Study II Vulnerability Handling Perspective Bruce Lowenthal – Senior Director, Security Alerts Eric Maurice