Zero-day attack

Zero-day attack

A zero-day (or zero-hour or day zero) attack or threat is a computer threat that tries to exploit computer application vulnerabilities that are unknown to others or the software developer. Zero-day exploits (actual software that uses a security hole to carry out an attack) are used or shared by attackers before the developer of the target software knows about the vulnerability.

The term derives from the age of the exploit. A "zero day" attack occurs on or before the first or "zeroth" day of developer awareness, meaning the developer has not had any opportunity to distribute a security fix to users of the software.[1]

Contents

Attack vectors

Malware writers are able to exploit zero-day vulnerabilities through several different attack vectors. Web browsers are a particular target because of their widespread distribution and usage. Attackers can also send e-mail attachments, which exploit vulnerabilities in the application opening the attachment.[2] Exploits that take advantage of common file types are listed in databases like US-CERT. Malware can be engineered to take advantage of these file type exploits to compromise attacked systems or steal confidential data such as banking passwords and personal identity information.[3]

Vulnerability window

Zero-day attacks occur during the vulnerability window that exists in the time between when a vulnerability is first exploited and when software developers start to develop a counter to that threat.

For viruses, Trojans and other zero-day attacks, the vulnerability window follows this time line:

  • The developer creates software containing a (unknown) vulnerability
  • The attacker finds the vulnerability before the developer does
  • The attacker writes and distributes an exploit while the vulnerability is not known to the developer
  • The developer becomes aware of the vulnerability and starts developing a fix.

Measuring the length of the vulnerability window can be difficult, as attackers do not announce when the vulnerability was first discovered. Developers may not want to distribute data for commercial or security reasons. Developers also may not know if the vulnerability is being exploited when they fix it, and so may not record the vulnerability as a zero-day attack. However, it can be easily shown that this window can be several years long. For example in 2008 Microsoft confirmed a vulnerability in Internet Explorer, which affected some versions that were released in 2001.[4] The date the vulnerability was first found by an attacker is not known, however the vulnerability window in this case could have been up to 7 years.

Discovery

A special type of vulnerability management process focuses on finding and eliminating zero-day weaknesses. This unknown vulnerability management lifecycle is a security and quality assurance process that aims to ensure the security and robustness of both in-house and third party software products by finding and fixing unknown (zero-day) vulnerabilities. The unknown vulnerability management process consists of four phases: analyze, test, report and mitigate.[5]

  • Analyze: this phase focuses on attack surface analysis
  • Test: this phase focuses on fuzz testing the identified attack vectors
  • Report: this phase focuses on reproduction of the found issues to developers
  • Mitigate: this phase looks at protective measures explained below

Protection

Zero-day protection is the ability to provide protection against zero-day exploits. Zero-day attacks can also remain undetected after they are launched.[6]

Many techniques exist to limit the effectiveness of zero-day memory corruption vulnerabilities, such as buffer overflows.[citation needed] These protection mechanisms exist in contemporary operating systems such as Windows 7, Microsoft Windows Vista, Apple's Mac OS X, recent Oracle Solaris, Linux and possibly other Unix and Unix-like environments; Microsoft Windows XP Service Pack 2 includes limited protection against generic memory corruption vulnerabilities.[7] Desktop and server protection software also exists to mitigate zero day buffer overflow vulnerabilities.[citation needed]

"Multiple layers" provides service-agnostic protection and is the first line of defense should an exploit in any one layer be discovered. An example of this for a particular service is implementing access control lists in the service itself, restricting network access to it via local server firewalling (i.e., IP tables), and then protecting the entire network with a hardware firewall. All three layers provide redundant protection in case a compromise in any one of them occurs.

The use of port knocking or single packet authorization daemons may provide effective protection against zero-day exploits in network services. However these techniques are not suitable for environments with a large number of users.

Whitelisting effectively protects against zero day threats. Whitelisting will only allow known good applications to access a system and so any new or unknown exploits are not allowed access. Although whitelisting is effective against zero-day attacks, an application "known" to be good can in fact have vulnerabilities that were missed in testing. To bolster its protection capability, it is often combined with other methods of protection such as host-based intrusion-prevention system or a blacklist of virus definitions, and it can sometimes be quite restrictive to the user.

Engineers and vendors such as Gama-Sec in Israel and DataClone Labs in Reno, Nevada are attempting to provide support with the Zeroday Project,[8] which purports to provide information on upcoming attacks and provide support to vulnerable systems.

Ethics

Differing views surround the collection and use of zero-day vulnerability information. Many computer security vendors perform research on zero-day vulnerabilities in order to better understand the nature of vulnerabilities and their exploitation by individuals, computer worms and viruses. Alternatively, some vendors purchase vulnerabilities to augment their research capacity. An example of such a program is TippingPoint's Zero Day Initiative. While selling and buying these vulnerabilities is not technically illegal in most parts of the world, there is much controversy over the method of disclosure. A recent German decision to include Article 6 of the Convention on Cybercrime and the EU Framework Decision on Attacks against Information Systems may make selling or even manufacturing vulnerabilities illegal.

Most formal efforts follow some form of RFPolicy disclosure guidelines or the more recent OIS Guidelines for Security Vulnerability Reporting and Response. In general these rules forbid the public disclosure of vulnerabilities without notification to the developer and adequate time to produce a patch.

History

See also

Footnotes

References

External links


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Zero day attack — A zero day (or zero hour) attack or threat is a computer threat that tries to exploit unknown, undisclosed or patchfree computer application vulnerabilities. The term Zero Day is also used to describe unknown or Zero day viruses. Zero day… …   Wikipedia

  • zero-day attack — /zɪəroʊ deɪ əˈtæk/ (say zearroh day uh tak) noun Computers an attack on an application by an outside user accessing the computer via the internet, that exploits a vulnerability in the application for which there is no available patch …  

  • Zero day — can refer to:* Zero Day (film), a 2003 film *Zero day attack, exploitation of unpatched software vulnerabilities *Zero day virus, any new and previously unknown virus *zero day, on long distance hikes, a day in which a hiker stays in the same… …   Wikipedia

  • Zero-day virus — A Zero day virus is a previously unknown computer virus or other malware for which specific antivirus software signatures are not yet available.[1] Traditionally, antivirus software relies upon signatures to identify malware. This can be very… …   Wikipedia

  • Zero Day (film) — Infobox Film name = Zero Day caption = Zero Day film poster director = Ben Coccio writer = Ben Coccio Christopher Coccio starring = Andre Keuck Cal Robertson producer = Ben Coccio distributor= Avatar Films budget = $20 000 (estimated) released= 3 …   Wikipedia

  • Day Zero — For the term in computer science, see zero day attack. Day Zero. Theatrical poster Directed by Bryan Gunnar Cole …   Wikipedia

  • Day of Vengeance — #1, (June 2005), cover art by Walt Simonson. Publication information Publisher DC Comics …   Wikipedia

  • Attack on Pearl Harbor — Part of the Pacific Theater of World War II …   Wikipedia

  • Attack of the Zolgear — was a video game implemented as a conversion kit for Namco s Theater 6 system, which was used for the 1994 arcade version of Galaxian 3 (which was originally a theme park attraction that debuted in 1990). A sequel to the aforementioned (which… …   Wikipedia

  • Zero (Mega Man) — General CVG character name=Zero caption=Zero as he appears in the Mega Man X and Mega Man Zero series. firstgame= Mega Man X series= Mega Man X series and Mega Man Zero series creator=Keiji Inafune voiceactor=Wayne Doster (1997 2002) Jack… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”