"I think we did really well," said Mike Reavey, group manager at the Microsoft Security Research Center (MSRC), when asked for a postmortem evaluation of the first cycle of the team's Exploitability Index. "Four of the issues that we said where consistent exploit code was likely did have exploit code appear over the first two weeks. And another key was that in no case did we rate something too low."More info at ComputerWorld.
The index, launched last month, rates each vulnerability using a three-step system. It predicts, in descending order of severity, the probability that researchers or hackers would come up with a consistently working exploit or develop an exploit that works only some of the time, or whether they would fail to craft attack code at all.
The predictions are valid for the following 30 days, or until the next cycle of patches is released.
Of the nine October vulnerabilities marked "Consistent exploit code likely," four did, in fact, end up with exploit code available, said Reavey, for an accuracy rate of 44%. None of the nine tagged "Inconsistent exploit code likely" had seen actual attack code. But Microsoft correctly called the four bugs last month tagged with "Functioning exploit code unlikely." As Reavey said, exploit code did not appear for any of the four.
All told, Microsoft correctly predicted eight out of October's 20 vulnerabilities' exploitability, an accuracy rate of 40%. (One of the month's 21 bugs did not receive a rating, as Microsoft said public exploit code was already circulating, making a label moot.)
Microsoft exploit predictions were 40% accurate last month
Posted on Friday, November 14 2008 @ 17:33 CET by Thomas De Maesschalck