https://de.wikipedia.org/w/api.php?action=feedcontributions&feedformat=atom&user=203.7.155.64 Wikipedia - Benutzerbeiträge [de] 2025-05-03T09:29:38Z Benutzerbeiträge MediaWiki 1.44.0-wmf.27 https://de.wikipedia.org/w/index.php?title=Responsible_Disclosure&diff=214577692 Responsible Disclosure 2009-12-29T23:56:45Z <p>203.7.155.64: you don&#039;t wait to patch, that&#039;s what the time window is for...</p> <hr /> <div>'''Responsible disclosure''' is a [[computer security]] term. It is like [[full disclosure]], with the addition that all stakeholders agree to allow a period of time for the [[Vulnerability (computing)|vulnerability]] to be [[Patch (computing)|patched]] before publishing the details. Developers of [[hardware]] and [[software]] often require time and resources to repair their mistakes. [[Hackers]] and computer security scientists have the opinion that it is their [[social responsibility]] to make the public aware of vulnerabilities with a high impact. Hiding those fact could suggest a feeling of [[security theater|false security]]. To avoid this, the involved parties join forces and agree on a period of time for repairing the vulnerability and prevent any future damage. Corresponding to the impact of the vulnerability it may require a period between a few weeks and several months. It is easier to [[Patch (computing)|patch]] software by using the [[internet]] as distribution channel.<br /> Responsible disclosure fails to satisfy security researchers who expect to be financially compensated, while reporting vulnerabilities to the vendor with the expectation of compensation might be viewed as extortion.<br /> While a market for vulnerabilities has developed, vulnerability commercialization remains a hotly-debated topic tied to the concept of vulnerability disclosure. Today, the two primary players in the commercial vulnerability market are iDefense, which started their vulnerability contributor program (VCP) in 2003, and TippingPoint, with their zero-day initiative (ZDI) started in 2005. These organisations follow the responsible disclosure process with the material bought. Between March 2003 and December 2007 in average 7.5% of the vulnerabilities affecting Microsoft and Apple were processed by either VCD or ZDI<br /> &lt;ref&gt;<br /> {{<br /> cite web<br /> |url = http://www.techzoom.net/papers/weis_security_ecosystem_2009.pdf<br /> |title = Paper measuring the prevalence of responsible disclosure and model of the processes of the security ecosystem<br /> }}<br /> &lt;/ref&gt;.<br /> <br /> [[Vendor-sec]] is a responsible disclosure mailing list. Many, if not all, of the [[CERT_Coordination_Center|CERT]] groups coordinate responsible disclosures.<br /> <br /> [[Security vulnerability]] resolved by applying responsible disclosure:<br /> * [[Dan Kaminsky]] discovery of [[DNS cache poisoning]], 5 months&lt;ref&gt;{{cite web<br /> |url = http://www.cert.org/netsa/publications/faber-OARC2008.pdf<br /> |title = Dan Kaminsky discovery of DNS cache poisoning<br /> }}&lt;/ref&gt;<br /> * [[Radboud University Nijmegen]] breaks the security of the [[MIFARE]] Classic cards, 6 months&lt;ref&gt;{{cite web<br /> |url = http://www2.ru.nl/media/pressrelease.pdf<br /> |title = Researchers break the security of the MIFARE Classic cards<br /> }}&lt;/ref&gt;<br /> * [[MBTA vs. Anderson]], MIT students find vulnerability in the Massachusetts subway security, 5 months&lt;ref&gt;{{cite web<br /> |url = http://tech.mit.edu/V128/N30/subway.html<br /> |title = MIT students find vulnerability in the Massachusetts subway security<br /> }}&lt;/ref&gt;<br /> * [[MD5]] collision attack that shows how to create false CA certificates, 1 week&lt;ref&gt;{{cite web<br /> |url = http://www.phreedom.org/blog/2009/verisign-and-responsible-disclosure/<br /> |title = MD5 collision attack that shows how to create false CA certificates<br /> }}&lt;/ref&gt;<br /> <br /> ==References==<br /> {{reflist}}<br /> <br /> {{comp-sci-stub}}<br /> [[Category:Computer security procedures]]</div> 203.7.155.64