zlacker

[parent] [thread] 11 comments
1. doctor+(OP)[view] [source] 2024-08-16 22:20:02
Everyone thinks bug bounties should be higher. How high should they be? Who should pay for them?
replies(2): >>hqzhao+H1 >>tptace+28
2. hqzhao+H1[view] [source] 2024-08-16 22:35:54
>>doctor+(OP)
It really depends on the target and the quality of the vulnerability. For example, low-quality software on GitHub might not warrant high bug bounties, and that's understandable. However, critical components like KVM, ESXi, WebKit, etc., need to be taken much more seriously.

For vendor-specific software, the responsibility to pay should fall on the vendor. When it comes to open-source software, a foundation funded by the vendors who rely on it for core productivity would be ideal.

For high-quality vulnerabilities, especially those that can demonstrate exploitability without any prerequisites (e.g., zero-click remote jailbreaks), the bounties should be on par with those offered at competitions like Pwn2Own. :)

replies(4): >>tptace+78 >>doctor+K8 >>logica+je >>77pt77+7i
3. tptace+28[view] [source] 2024-08-16 23:59:59
>>doctor+(OP)
Who thinks bug bounties should be higher? Why? Everybody definitely does not think this.
replies(1): >>vasco+et
◧◩
4. tptace+78[view] [source] [discussion] 2024-08-17 00:00:59
>>hqzhao+H1
Google and Apple bounties on zero-click remotes exceeds the prize amounts I see from Pwn2Own?
◧◩
5. doctor+K8[view] [source] [discussion] 2024-08-17 00:10:13
>>hqzhao+H1
It seems really hard for people to like, name some vulnerabilities, name some prices. I'm glad you are playing along. Which scenario makes more sense:

    The Punchline: Microsoft pays $10m for vulnerabilities like the kind used to exploit SolarWinds and the Azure token audience vulnerability.

    The Status Quo: Thousands of people pay CrowdStrike a total of billions of dollars, in exchange for urgent patching when vulnerabilities become known.
Okay, do you see what I am getting at? On the one hand, if you pay bug bounties, the bugs get fixed, and they sure seem expensive. But if you look into how much money is spent on valueless security theatre, it is a total drop in the bucket. But CrowdStrike hires security researchers!

So what should the prices really be? For which vulnerabilities? The SolarWinds issue is probably worth more than $10m, if people are willing to pay 100x more to CrowdStrike for nothing.

replies(2): >>saagar+3l >>necove+Pn
◧◩
6. logica+je[view] [source] [discussion] 2024-08-17 01:56:46
>>hqzhao+H1
p2o is pathetically low in comparison to other markets. is your experience limited to legitimate bug bounty programs like that?
◧◩
7. 77pt77+7i[view] [source] [discussion] 2024-08-17 03:20:55
>>hqzhao+H1
> KVM, ESXi, WebKit, etc., need to be taken much more seriously.

Openssl

◧◩◪
8. saagar+3l[view] [source] [discussion] 2024-08-17 04:37:52
>>doctor+K8
The real question here is who is willing to pay $10 million for such a bug.
replies(1): >>tptace+7u1
◧◩◪
9. necove+Pn[view] [source] [discussion] 2024-08-17 06:00:18
>>doctor+K8
It's not as simple: those billions of dollars are not just for this particular issue, or even just for security support.

It's also a difference between keeping a software engineer on staff and hiring a contractor as needed. One is cheaper for the company even if the hourly rate is higher.

The better question is how we can improve the overall security of the software we write, which this article is more focused on. But we understand that there will be bugs, and security bugs even, no matter how hard we try.

Even DJB (of qmail fame) and Knuth (of TeX and TAOCP fame) pay out bug bounties, and they heavily focus on software correctness over large feature sets.

◧◩
10. vasco+et[view] [source] [discussion] 2024-08-17 08:02:20
>>tptace+28
There's always two or three people in every thread repeating the same thing without any understanding of marketplace dynamics. If you ask them how much should it be you also get wild answers that don't reflect reality.
◧◩◪◨
11. tptace+7u1[view] [source] [discussion] 2024-08-17 18:10:21
>>saagar+3l
Nobody. That far exceeds the current market prices of the most in-demand bugs.
replies(1): >>doctor+IA1
◧◩◪◨⬒
12. doctor+IA1[view] [source] [discussion] 2024-08-17 18:57:45
>>tptace+7u1
What is this market you speak of? Can you link me to it and show me the prices you are talking about? The Microsoft key vulnerability leaked all the State Department emails, and probably a lot more. It could have been used to compromise a lot of Azure. What is comparable?
[go to top]