Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages.

I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages.

Scheduled Pinned Locked Moved Uncategorized
33 Posts 19 Posters 33 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

    @rootwyrm

    I'm not arguing with you. Sorry if it sounds like I am. I don't have the same technical background you do and am asking how the 7.8-severity vuln shouldn't be considered high severity because it involves fonts . . . bounds checking? I'm asking you to explain the reasoning behind your assessment as if I was a student in a security 101 class.

    hatter@metasocial.comH This user is from outside of this forum
    hatter@metasocial.comH This user is from outside of this forum
    hatter@metasocial.com
    wrote last edited by
    #22

    @dangoodin @rootwyrm It seems like their Ai is discovering flaws that have already been patched - the exact mechanisms may not have been disclosed previously and claude now knows there may be unpatched code out there, and how to exploit the, because it''s done some kind of analysis of the applied patch. If you don't patch your systems regularly, you are still vulnerable to older exploits.

    1 Reply Last reply
    0
    • rootwyrm@weird.autosR rootwyrm@weird.autos

      @dangoodin the tl;dr is basically that they are making the completely bogus claim that they 'discovered' a vulnerability, because they found the commit, which was specifically to fix the already disclosed vulnerability.

      This is as insane as claiming to have shockingly discovered someone has a dog after they texted you pictures of them holding a puppy, asked you for name suggestions, set up IG and YT accounts for the puppy you subscribe to, and you hosted a puppy party at your house.

      mhitza@third-party.cyouM This user is from outside of this forum
      mhitza@third-party.cyouM This user is from outside of this forum
      mhitza@third-party.cyou
      wrote last edited by
      #23

      @rootwyrm then it goes on and says that it found another code path that was similar to the fixed bug which was missing a necessary check.

      @dangoodin here is the commit for GhostScript. I'm not an expert to assert on their claim of high severity
      https://github.com/ArtifexSoftware/ghostpdl/commit/4e392a82d1b1780cab85804728317f36a9c4f7f7

      1 Reply Last reply
      0
      • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

        Thanks for all the responses. So far, projects I understand to have received reports include: Ghostscript, OpenSC, lzw, and CGIF. Are others known? Links to commits that fix the vulns also appreciated.

        mhitza@third-party.cyouM This user is from outside of this forum
        mhitza@third-party.cyouM This user is from outside of this forum
        mhitza@third-party.cyou
        wrote last edited by
        #24

        @dangoodin the OpenSC commit that contains the highlighted code on the post https://github.com/OpenSC/OpenSC/commit/9ab1daf21029dd18f8828d684ee6151d9238edab . No detail about the fix and no security disclosure on the GitHub repository.

        1 Reply Last reply
        0
        • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

          I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

          0-Days \ red.anthropic.com

          favicon

          (red.anthropic.com)

          trode@hachyderm.ioT This user is from outside of this forum
          trode@hachyderm.ioT This user is from outside of this forum
          trode@hachyderm.io
          wrote last edited by
          #25

          @dangoodin hearsay, but I heard the model used had reduced safeguards, which allowed it to be more aggressive

          1 Reply Last reply
          0
          • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

            I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

            0-Days \ red.anthropic.com

            favicon

            (red.anthropic.com)

            spaceinvader@social.securitytheater.netS This user is from outside of this forum
            spaceinvader@social.securitytheater.netS This user is from outside of this forum
            spaceinvader@social.securitytheater.net
            wrote last edited by
            #26

            @dangoodin How popular/big were these OSS projects? There’s a big difference between finding a vuln in something like curl or Apache and my janky crap I pushed up to GitHub.

            CVSS of 10/10 in my thing will impact one person, but in curl it’ll impact a few million more people. Including, still, me.

            1 Reply Last reply
            0
            • rootwyrm@weird.autosR rootwyrm@weird.autos

              @dangoodin zero question it's pure fantasy bullshit. They refuse to show their work, as usual. All they've got is a middling CGIF vulnerability that isn't, and claiming credit for "finding" a vulnerability in GhostScript because "hey this commit did a thing so they must have had a vulnerability!"

              leberschnitzel@existiert.chL This user is from outside of this forum
              leberschnitzel@existiert.chL This user is from outside of this forum
              leberschnitzel@existiert.ch
              wrote last edited by
              #27

              @rootwyrm according to their blog it didn't claim that it found the vulnerability in the commit, but checked the rest of the code base if the same vulnerability might be unpatched in other places, and it seems to have been.
              My questions are more with some others here: how many false positives had the human experts need to wade through to get to the real vulnerabilities

              @dangoodin

              dangoodin@infosec.exchangeD 1 Reply Last reply
              0
              • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                0-Days \ red.anthropic.com

                favicon

                (red.anthropic.com)

                raymaccarthy@mastodon.ieR This user is from outside of this forum
                raymaccarthy@mastodon.ieR This user is from outside of this forum
                raymaccarthy@mastodon.ie
                wrote last edited by
                #28

                @dangoodin
                Anthropic have a lot of resources for PR and issue a lot of dubious and misleading statements?

                1 Reply Last reply
                0
                • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                  I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                  0-Days \ red.anthropic.com

                  favicon

                  (red.anthropic.com)

                  david_chisnall@infosec.exchangeD This user is from outside of this forum
                  david_chisnall@infosec.exchangeD This user is from outside of this forum
                  david_chisnall@infosec.exchange
                  wrote last edited by
                  #29

                  @dangoodin

                  There's a long history of doing fuzzy matching on patterns of known bugs to find more of the same kind. Coccinelle is the most well-known example of this. It was not actually written for vulnerability discovery, but it turns out that you could write patterns to patch a vulnerability and then it would find a load of similar ones.

                  Few projects actually use it.

                  OpenBSD has a policy that people who find security bugs should search for similar things in the code and fix them all. It turns out that humans who write a bug in one places are very likely to write the same bug elsewhere and this is no less true for bugs that lead to security vulnerabilities.

                  It sounds like this is a pretty good use case for an LLM, because it is a tool for doing fuzzy matching on a token stream. Finding patches that fixed vulnerabilities and then looking for the 'before' shape in other places will find a load of things.

                  With a bit of automation (sorry, 'agentic' use), you can do the following flow:

                  • Find things that look like the 'before' state.
                  • Apply a patch to make it look like the 'after' state.
                  • Use guided fuzzing techniques to try to produce a test case that triggers the new checks introduced in the 'after' version.
                  • If you find an example, flag it to the user as a potential security issue.

                  It's probably very computationally expensive, but cheaper than having a human do the same thing (which is so expensive almost no one does it).

                  1 Reply Last reply
                  1
                  0
                  • R relay@relay.infosec.exchange shared this topic
                  • leberschnitzel@existiert.chL leberschnitzel@existiert.ch

                    @rootwyrm according to their blog it didn't claim that it found the vulnerability in the commit, but checked the rest of the code base if the same vulnerability might be unpatched in other places, and it seems to have been.
                    My questions are more with some others here: how many false positives had the human experts need to wade through to get to the real vulnerabilities

                    @dangoodin

                    dangoodin@infosec.exchangeD This user is from outside of this forum
                    dangoodin@infosec.exchangeD This user is from outside of this forum
                    dangoodin@infosec.exchange
                    wrote last edited by
                    #30

                    @leberschnitzel @rootwyrm

                    Ah thanks. I knew I was missing something.

                    1 Reply Last reply
                    0
                    • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                      I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                      0-Days \ red.anthropic.com

                      favicon

                      (red.anthropic.com)

                      aburka@hachyderm.ioA This user is from outside of this forum
                      aburka@hachyderm.ioA This user is from outside of this forum
                      aburka@hachyderm.io
                      wrote last edited by
                      #31

                      @dangoodin it reads as a threat

                      1 Reply Last reply
                      0
                      • fritzadalis@infosec.exchangeF fritzadalis@infosec.exchange

                        @GossiTheDog @dangoodin
                        For #3 there are a bunch of recent commits to the lzw code.

                        These really seem like bugs that existing scanners should have found, especially strcat use (#2).

                        bertdriehuis@infosec.exchangeB This user is from outside of this forum
                        bertdriehuis@infosec.exchangeB This user is from outside of this forum
                        bertdriehuis@infosec.exchange
                        wrote last edited by
                        #32

                        @FritzAdalis @GossiTheDog @dangoodin that’s the problem with human code review: humans just aren't that good at repetitive work (even though it stuns me that anyone who fixes an issue resulting from strcat() usage would not simply do a grep -r for other occurrences).

                        I have read, and reread, all BER related code in netsnmp, and managed to miss a number of integer overruns - even though I was specifically looking for them. It's that experience that makes me such an advocate for languages such as Rust.

                        1 Reply Last reply
                        0
                        • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                          I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                          0-Days \ red.anthropic.com

                          favicon

                          (red.anthropic.com)

                          reverseics@infosec.exchangeR This user is from outside of this forum
                          reverseics@infosec.exchangeR This user is from outside of this forum
                          reverseics@infosec.exchange
                          wrote last edited by
                          #33

                          @dangoodin I wrote up an analysis of the first 'vulnerability' they wrote about. it does not appear to be a vulnerability at all (sure the original code uses 'unsafe' functions, but you can't exploit anything as far as I can tell). https://infosec.exchange/@reverseics/116067178548980458 .

                          I can't speak to the second vulnerability they wrote about, it would take me too long to determine whether it is a real or a hallucinated bug.

                          1 Reply Last reply
                          1
                          0
                          • R relay@relay.infosec.exchange shared this topic
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups