We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
 
75,052 News Articles

FrSirt stops distributing free exploit code

Software vendors can sleep at night again

A prominent French security company has stopped distributing exploit code to the general public – a move that should come as a relief to many software vendors.

FrSirt, formerly called K-Otik, and its parent company AD Consulting offer security consulting services, as well as a database recording software vulnerabilities. But the site also goes a step further, and publishes code exploiting those vulnerabilities, to the chagrin of some vendors, who claim that such practices verge on the irresponsible.

However, the firm has now pulled its database of exploit code into a paid service called FrSirt Vulnerability Notification Service (FrSirt VNS). The vulnerabilities database is still publicly available.

The VNS offers notification services and incident response, according to FrSirt, with notifications via a customisable web-based interface and email. FrSirt claims to monitor 50,000 product versions. FrSirt VNS also offers an online vulnerability scanner to identify vulnerabilities on a system. The basic service allows for one user, with a premium 'VNS+' service supporting five or more users.

The three-year-old company has been active in its support of a 'full disclosure' agenda since its formation, arguing that this leads to more secure products. Its corporate policy states that FrSirt will "publish all the technical details of [a new vulnerability] at the time of its discovery".

This is a more extreme view than that taken by other firms, which often keep bugs completely under wraps until they have been patched. Some firms, such as Verisign's iDefense, notify the public that there will be a vulnerability disclosed, but don't give details until a patch has been released.

FrSirt argues that its policy helps "to ensure IT security and to encourage vendors to quickly develop solutions and corrective measures for security problems".

However, security researchers are finding a growing market for selling exploit research, rather than publishing it to the general public. TippingPoint and iDefense are among those who offer payment for such research; last year an exploit for Microsoft Excel famously went on sale on eBay.

Until recently, the notorious hacker holy_father offered a paid version of his rootkit, Hacker Defender, with regular updates designed to fool security software.

This story first appeared on Techworld.com.


IDG UK Sites

Samsung Galaxy Note 4 release date, price and specs 2014

IDG UK Sites

What's the best smartwatch? 11 iWatch rivals compared in our wearables round-up

IDG UK Sites

5 reasons to upgrade to BT's YouView+ box: DTR-T1000 vs DTR-T2100

IDG UK Sites

Developers get access to more Sony camera features