Price War: iDefense Doubles Bounty for Security Flaws
http://news.yahoo.com/s/zd/20050728/tc_zd/156872&printer=1;_ylt=AqLfkvdz3C2A
ZFyESKF_vpFY.3QA;_ylu=X3oDMTA3MXN1bHE0BHNlYwN0bWE-

Ryan Naraine - eWEEK Thu Jul 28, 2:28 AM ET

LAS VEGAS‹The decision by 3Com Corp.'s TippingPoint division to pay for the
rights to information on software vulnerabilities has triggered an immediate
response from iDefense Inc., the company that previously held a monopoly on
the flaw bounty business.

Effective immediately, iDefense is doubling its pricing structure for
vulnerability submissions and hiking the value of the incentive and
retention reward programs.

Paying for flaws has been paying off for iDefense. Click here to read more.

In addition, the VeriSign-owned company announced the launch of a new growth
reward program that offers lump sum payments for hackers who continue to
increase their level of participation in the controversial VCP
(Vulnerability Contribution Program).

The bounty increases come just days after TippingPoint's launch of the Zero
Day Initiative, a program that pays researchers for data on vulnerabilities.
The company said ZDI will promote responsible disclosure by working closely
with affected vendors to get patches created before the flaws are made
public.

Does paying for flaws undermine security? Click here to read more.

Neither company will say how much it pays for the flaw information, but Ziff
Davis Internet News has learned that proof-of-concept exploit code for a
code execution bug in a product like Microsoft Corp.'s Internet Explorer
browser could earn the flaw finder more than $6,000.

That price automatically doubles with iDefense's latest move, which is
likely to prod TippingPoint into matching.

iDefense Labs Director Michael Sutton said the expansion of the VCP will
immediately offer "substantively increase[ed] pricing."

"First off, effective immediately, we will be doubling our standard pricing
structure for vulnerability submissions. As always, in order to obtain a
price quote, we require that a contributor first submit a discovery to
[EMAIL PROTECTED] Once accepted, we will gladly provide a price
quote and forward the appropriate contract," Sutton said in a notice posted
on a popular security mailing list.

He also announced the sweetening of the pot for the iDefense rewards
program, which provides an incentive to the top five contributors each year.
The biggest contributor can now earn a $10,000 incentive, up from $5,000.

The iDefense incentive program, which rewards the top three vulnerability
contributors each quarter, has also been increased by up to $2,000.

Sutton said a new Growth program will also be implemented to reward
contributors who increase their level of participation in the VCP.

The burgeoning competition between iDefense and TippingPoint was being
discussed in the hallways of the Black Hat Briefings here. TippingPoint is
using the conference to drum up hacker interest in its new program and, for
the most part, researchers welcomed the opportunity to earn money for flaw
discoveries.

"If they keep upping the price, more power to us," said one researcher who
has submitted vulnerabilities anonymously to iDefense's VCP. "I'm pretty
sure the highest bidder will win the day because these guys need to earn
money."

Officials from Microsoft Corp.'s security response center were also paying
close attention to the news. In an interview, MSRC Director Kevin Kean said
Microsoft supports any initiative that promotes the responsible disclosure
of vulnerabilities.

"If it's a program in place to allow us to get an update out to customers
before it becomes a big risk, we're happy to see that," Kean said.

"There are two things that we want. We want to know about the vulnerability
as early as possible. And we want to know about it responsibly. If these
companies report things to us in a responsible way and work closely with us
to get customers protected, we're happy."

Asked if Microsoft would consider a bounty program of its own, Kean said,
"At this time, we don't think paying for vulnerabilities is what we should
be doing."

Check out eWEEK.com's Security Center for the latest security news, reviews
and analysis. And for insights on security coverage around the Web, take a
look at eWEEK.com Security Center Editor Larry Seltzer's Weblog.




You are a subscribed member of the infowarrior list. Visit
www.infowarrior.org for list information or to unsubscribe. This message
may be redistributed freely in its entirety. Any and all copyrights
appearing in list messages are maintained by their respective owners.

Reply via email to