Abyssec is following a full vulnerability disclosure strategy. Since 1993 and the formation of the Bugtraq mailing...
list, there has been a significant disagreement regarding how vulnerabilities should be disclosed; the list was formed to discuss vulnerabilities regardless of the vendor response in order to pressure vendors into patching their software. One of Abyssec's goals in using full disclosure is to pressure software developers to fix their code faster than exploit writers can develop exploits, but, given the current speed exploits are developed, this is probably a losing battle for software developers. Abyssec is planning on releasing more details than are commonly released in order to assist security professionals with determining the amount of risk these vulnerabilities pose to their organizations, as well as with developing effective mitigation strategies. Promoting their company, however, is the most likely long-term result of the "Month of Bugs" campaign.
While some may question Abyssec's motivation, the fact that they are openly sharing the results of their findings -- rather than selling the vulnerabilities to the highest bidder on the black market -- will help improve information security, since all enterprises can freely use the information to make informed decisions. The stakes of employing such vulnerability disclosure tactics are high; however, until the vulnerabilities are patched, they're left wide open to exploitation by malicious attackers . If the researchers worked with software developers prior to announcing a vulnerability, they could help minimize these high costs to end users and also satisfy their goals.
Dig Deeper on Vulnerability Risk Assessment
Related Q&A from Nick Lewis, Enterprise Threats
Chameleon malware targets insecure wireless access points. Enterprise threats expert Nick Lewis explains how to defend against the malware.continue reading
The Zeus malware is threatening RTF security by embedding itself in the file, which is commonly seen as safer than other file formats such as PDFs. ...continue reading
Enterprise threats expert Nick Lewis explains how to detect and avoid one of the most advanced malware threats: The Mask.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.