Gray Hat Hacking, The Ethical Hacker’s Handbook, Third Edition
50
           details would be released to its customers and the public at a “prescribed period of
           time” after the vendor has been notified. ISS coordinates their public disclosure of the
           flaw with the vendor’s disclosure. This policy only fueled the people who feel that vul-
           nerability information should be available for the public to protect themselves.
               This dilemma, and many others, represents the continual disconnect among ven-
           dors, security companies, and gray hat hackers today. Differing views and individual
           motivations drive each group down various paths. The models of proper disclosure that
           are discussed in this chapter have helped these different entities to come together and
           work in a more concerted effort, but much bitterness and controversy around this issue
           remains.
                          NOTE The range of emotion, the numerous debates, and controversy
                          over the topic of full disclosure has been immense. Customers and security
                          professionals alike are frustrated with software flaws that still exist in the
                          products in the first place and the lack of effort from vendors to help in this
                          critical area.Vendors are frustrated because exploitable code is continually
                          released just as they are trying to develop fixes. We will not be taking one side
                          or the other of this debate, but will do our best to tell you how you can help,
                          and not hurt, the process.
           CERT’s Current Process
           The first place to turn to when discussing the proper disclosure of software vulnerabili-
           ties is the governing body known as the CERT Coordination Center (CC). CERT/CC is a
           federally funded research and development operation that focuses on Internet security
           and related issues. Established in 1988 in reaction to the first major virus outbreak on
           the Internet, the CERT/CC has evolved over the years, taking on more substantial roles
           in the industry, which includes establishing and maintaining industry standards for the
           way technology vulnerabilities are disclosed and communicated. In 2000, the organiza-
           tion issued a policy that outlined the controversial practice of releasing software vulner-
           ability information to the public. The policy covered the following areas:
                 • Full disclosure will be announced to the public within 45 days of being
                   reported to CERT/CC. This timeframe will be executed even if the software
                   vendor does not have an available patch or appropriate remedy. The only
                   exception to this rigid deadline will be exceptionally serious threats or
                   scenarios that would require a standard to be altered.
                 • CERT/CC will notify the software vendor of the vulnerability immediately so
                   that a solution can be created as soon as possible.
                 • Along with the description of the problem, CERT/CC will forward the name of
                   the person reporting the vulnerability unless the reporter specifically requests
                   to remain anonymous.
                 • During the 45-day window, CERT/CC will update the reporter on the current
                   status of the vulnerability without revealing confidential information.