Net group wants input on vulnerability reporting guide
Consortium of software vendors, researchers and consultants hopes to address issues such as what role ? if any ? the government should play in vulnerability reporting.
The Organization for Internet Safety is soliciting comments on its guidelines for reporting and responding to software security vulnerabilities.
OIS, a consortium of software vendors, researchers and security consultants, released the guidelines in July 2003, hoping to bring some order to the continual struggle between code makers and code breakers. The second version is expected to be available in mid-July.
OIS hopes to address some issues in the second release that were sidestepped in the first edition, such as what role?if any?the government should play in vulnerability reporting.
That was one of the few issues on which the drafters could not come to any clear consensus last year, said Scott Blake, vice president of information security for BindView Corp. of Houston and chairman of the OIS communications committee.
"We're hoping to get some additional comment on that that would help sway us," Blake said. "It is not abundantly clear to us what the right thing to do is."
The voluntary guidelines, available on the OIS Web site, are an effort to balance the public's right to know about possible software problems against the need for vendors to correct those problems before they are made public.
They call for:
- cooperation between the discoverer of a flaw and the software vendor
- a waiting period, typically 30 days, to let a vendor correct a problem before it is publicly announced
- a 30-day grace period to let users fix their systems before technical details that could help attackers are released.
feedback@oisafety.org
NEXT STORY: OMB hails benefits of competitive sourcing