5198 Security Vulnerabilities tracked by US-CERT in 2005



The headline probably says most all… 5198 vulnerabilities tracked by US-Cert in 2005. This comes from The SecurityFix. It’s probably not every vulernability that was out in 2005, just those that US-CERT issued advisories for. The breakdown is 812 in Windows 2,328 in various Unix/Linux/Mac/BSD systems and 2,058 affecting multiple operating systems. It would be interesting to see a breakdown of core operating system vulnerabilities versus, addon software. One problem with this kind of breakdown is most linux distributions ship the addon software with the core operating system. That’s likely why it doesn’t get tracked that way.


In the security fix post, Brian notes that many Microsoft Windows patches seem to address multiple issues in a single patch. This has the effect of possibly downlplaying the number of announced advisories. If one fix solves 8 problems is it really only one vulnerability?

The bottom line is this though. Software has bugs, ALL software. This is one of the first things I remember being taught in an introductory programming class. These days any program that opens documents or data from another machine is potentially a security risk. In addition to any program that accepts incoming connections from other machines. That’s a bit overwhelming, but true. I suspect as the number of differnet software programs multiplies, so will the vulnerabilities. I’m afraid I don’t see ways that the potential problems go away.

Related Posts

Blog Traffic Exchange Related Posts
  • Microsoft to bundle anti-spyware with vista Well it shouldn't come as a big surprise, but Microsoft is expected to bundle their anti-spyware product (which will be renamed windows defender) with Vista when the next version of the OS ships. It's probably not a big surprise given the headaches that people have with spyware and the potential......
  • Remove Proof Defender | Proof Defender Removal Proof Defender is another rogue security application that acts and claims to be antispyware/antivirus, but in reality is nothing more than a scam to get your dollars for a program that raises red flags over imaginary viruses and claims to clean them. It's related to the Perfect Defender 2009 family......
  • Third Party WMF patch The F-secure blog is reporting on a third party patch for the WMF exploit. I have not tested it, it seems to come from a knowledgable source though. As I'm writing this though, the thought strikes me that a really nasty trick would be a claimed fix that actually exploited......
Blog Traffic Exchange Related Websites
  • Most Popular and Useful Security Apps for a Smart Phone The following is a post from staff writer Crystal at Budgeting in the Fun Stuff, where she writes about finding the balance between paying your bills, saving for your future, and budgeting in the fun stuff along the way. Buying a smart phone is a major investment because you spend......
  • 3 Reasons to Use Coin Software with Your Collection Just like every other industry, the coin collecting industry has gone high tech. You can buy and sell coins online. You can also use software to grade and keep track of the value of your collection. There are those out there who are resistant to these changes. They prefer the......
  • Features of Dozers Dozers have been used since the 1920s and are now an integral piece of earth-moving equipment. You'll find them at almost every job site and construction site, used with backhoes, cranes, excavators, rough-terrain forklifts and front loaders. Dozers are also often used in farming. Bulldozers are similar to crawler tractors......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site