5198 Security Vulnerabilities tracked by US-CERT in 2005



The headline probably says most all… 5198 vulnerabilities tracked by US-Cert in 2005. This comes from The SecurityFix. It’s probably not every vulernability that was out in 2005, just those that US-CERT issued advisories for. The breakdown is 812 in Windows 2,328 in various Unix/Linux/Mac/BSD systems and 2,058 affecting multiple operating systems. It would be interesting to see a breakdown of core operating system vulnerabilities versus, addon software. One problem with this kind of breakdown is most linux distributions ship the addon software with the core operating system. That’s likely why it doesn’t get tracked that way.


In the security fix post, Brian notes that many Microsoft Windows patches seem to address multiple issues in a single patch. This has the effect of possibly downlplaying the number of announced advisories. If one fix solves 8 problems is it really only one vulnerability?

The bottom line is this though. Software has bugs, ALL software. This is one of the first things I remember being taught in an introductory programming class. These days any program that opens documents or data from another machine is potentially a security risk. In addition to any program that accepts incoming connections from other machines. That’s a bit overwhelming, but true. I suspect as the number of differnet software programs multiplies, so will the vulnerabilities. I’m afraid I don’t see ways that the potential problems go away.

Related Posts

Blog Traffic Exchange Related Posts
  • Remove SafetyKeeper | SafetyKeeper Removal SafetyKeeper is a rogue security application that installs via malware (trojans) and via trojan horse applications also displays security warning popups claiming that the system is infected with malware. (Files that it creates are cited as evidence of the malware infection.) It will also cite "infiltration alerts" or "security center......
  • How to Remove Guard Pro | Guard Pro Removal Guide Guard Pro is a rogue antivirus application that is promoted through the use of malware and trojan horses. Once it is installed on a system it will run at startup and will scan the computer claiming to find files infected with viruses and finding security problems with your system. It......
  • Third Party WMF patch The F-secure blog is reporting on a third party patch for the WMF exploit. I have not tested it, it seems to come from a knowledgable source though. As I'm writing this though, the thought strikes me that a really nasty trick would be a claimed fix that actually exploited......
Blog Traffic Exchange Related Websites
  • Features of Dozers Dozers have been used since the 1920s and are now an integral piece of earth-moving equipment. You'll find them at almost every job site and construction site, used with backhoes, cranes, excavators, rough-terrain forklifts and front loaders. Dozers are also often used in farming. Bulldozers are similar to crawler tractors......
  • Article Submission Software Helps Make Work Simpler For Internet Marketers Article submission software helps make article marketing to internet directories much easier and far simpler for your company. When you have a program that may instantly submit your posts, you may attain the most effective publicity that's possible for your articles. These programs can automatically submit your article to a......
  • Using the Online Social Security Retirement Benefit Estimator Baby boomers and others thinking ahead about retirement wait patiently and sometimes anxiously for the delivery of their annual paper copy of their Social Security earnings record and benefit estimate.  Mr. GoTo's statement arrives each September.  The benefit estimate information in this statement is useful in several ways.  First, it is a reality check for baby boomers who......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site