Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages.

I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages.

Scheduled Pinned Locked Moved Uncategorized
33 Posts 19 Posters 33 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • rootwyrm@weird.autosR rootwyrm@weird.autos

    @dangoodin that is EXACTLY what Anthropic said. LITERALLY it is the FIRST "vulnerability" they bogusly claim to have found.

    > Neither of these methods yielded any significant findings. Eventually, however, Claude took a different approach: reading the Git commit history. Claude quickly found a security-relevant commit, and commented:

    dangoodin@infosec.exchangeD This user is from outside of this forum
    dangoodin@infosec.exchangeD This user is from outside of this forum
    dangoodin@infosec.exchange
    wrote last edited by
    #14

    @rootwyrm

    Right, but the post doesn't say merely that the reports of the 500 vulns resulted in commits. It says all 500 were high-severity. If true, that would be significant, no?

    1 Reply Last reply
    0
    • rootwyrm@weird.autosR rootwyrm@weird.autos

      @dangoodin that is EXACTLY what Anthropic said. LITERALLY it is the FIRST "vulnerability" they bogusly claim to have found.

      > Neither of these methods yielded any significant findings. Eventually, however, Claude took a different approach: reading the Git commit history. Claude quickly found a security-relevant commit, and commented:

      rootwyrm@weird.autosR This user is from outside of this forum
      rootwyrm@weird.autosR This user is from outside of this forum
      rootwyrm@weird.autos
      wrote last edited by
      #15

      @dangoodin to which I said "hang the fuck on" and read a bit more. And hey look, it's in fonts... bounds checking...

      Link Preview Image
      Snyk Vulnerability Database | Snyk

      Medium severity (7.8) Out-of-bounds Read in ghostscript-tools-fonts | CVE-2024-46956

      favicon

      Learn more about centos:10 with Snyk Open Source Vulnerability Database (security.snyk.io)

      dangoodin@infosec.exchangeD 1 Reply Last reply
      0
      • rootwyrm@weird.autosR rootwyrm@weird.autos

        @dangoodin to which I said "hang the fuck on" and read a bit more. And hey look, it's in fonts... bounds checking...

        Link Preview Image
        Snyk Vulnerability Database | Snyk

        Medium severity (7.8) Out-of-bounds Read in ghostscript-tools-fonts | CVE-2024-46956

        favicon

        Learn more about centos:10 with Snyk Open Source Vulnerability Database (security.snyk.io)

        dangoodin@infosec.exchangeD This user is from outside of this forum
        dangoodin@infosec.exchangeD This user is from outside of this forum
        dangoodin@infosec.exchange
        wrote last edited by
        #16

        @rootwyrm

        CVSS is 7.8, which is high, no? That would seem to support the Anthropic's claim. What's the significance of the vulns being in fonts . . . bounds checking?

        rootwyrm@weird.autosR 1 Reply Last reply
        0
        • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

          I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

          0-Days \ red.anthropic.com

          favicon

          (red.anthropic.com)

          cerement@social.targaryen.houseC This user is from outside of this forum
          cerement@social.targaryen.houseC This user is from outside of this forum
          cerement@social.targaryen.house
          wrote last edited by
          #17

          @dangoodin

          (on the flip side, curl ending their bug bounty program because of the flood of slop reports)

          salty@mastodon.nzS 1 Reply Last reply
          0
          • cerement@social.targaryen.houseC cerement@social.targaryen.house

            @dangoodin

            (on the flip side, curl ending their bug bounty program because of the flood of slop reports)

            salty@mastodon.nzS This user is from outside of this forum
            salty@mastodon.nzS This user is from outside of this forum
            salty@mastodon.nz
            wrote last edited by
            #18

            @cerement @dangoodin Exactly what I was going to point out.

            1 Reply Last reply
            0
            • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

              @rootwyrm

              CVSS is 7.8, which is high, no? That would seem to support the Anthropic's claim. What's the significance of the vulns being in fonts . . . bounds checking?

              rootwyrm@weird.autosR This user is from outside of this forum
              rootwyrm@weird.autosR This user is from outside of this forum
              rootwyrm@weird.autos
              wrote last edited by
              #19

              @dangoodin the significance is that by their own words, they didn't discover shit. Check the date on that CVE. But they're trying to claim dishonestly that their magical almost-to-AGI stochastic parrot totally discovered it.
              It did not. Period.

              dangoodin@infosec.exchangeD 1 Reply Last reply
              0
              • rootwyrm@weird.autosR rootwyrm@weird.autos

                @dangoodin the significance is that by their own words, they didn't discover shit. Check the date on that CVE. But they're trying to claim dishonestly that their magical almost-to-AGI stochastic parrot totally discovered it.
                It did not. Period.

                dangoodin@infosec.exchangeD This user is from outside of this forum
                dangoodin@infosec.exchangeD This user is from outside of this forum
                dangoodin@infosec.exchange
                wrote last edited by
                #20

                @rootwyrm

                I'm not arguing with you. Sorry if it sounds like I am. I don't have the same technical background you do and am asking how the 7.8-severity vuln shouldn't be considered high severity because it involves fonts . . . bounds checking? I'm asking you to explain the reasoning behind your assessment as if I was a student in a security 101 class.

                rootwyrm@weird.autosR hatter@metasocial.comH 2 Replies Last reply
                0
                • R relay@relay.an.exchange shared this topic
                • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                  @rootwyrm

                  I'm not arguing with you. Sorry if it sounds like I am. I don't have the same technical background you do and am asking how the 7.8-severity vuln shouldn't be considered high severity because it involves fonts . . . bounds checking? I'm asking you to explain the reasoning behind your assessment as if I was a student in a security 101 class.

                  rootwyrm@weird.autosR This user is from outside of this forum
                  rootwyrm@weird.autosR This user is from outside of this forum
                  rootwyrm@weird.autos
                  wrote last edited by
                  #21

                  @dangoodin the tl;dr is basically that they are making the completely bogus claim that they 'discovered' a vulnerability, because they found the commit, which was specifically to fix the already disclosed vulnerability.

                  This is as insane as claiming to have shockingly discovered someone has a dog after they texted you pictures of them holding a puppy, asked you for name suggestions, set up IG and YT accounts for the puppy you subscribe to, and you hosted a puppy party at your house.

                  mhitza@third-party.cyouM 1 Reply Last reply
                  0
                  • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                    @rootwyrm

                    I'm not arguing with you. Sorry if it sounds like I am. I don't have the same technical background you do and am asking how the 7.8-severity vuln shouldn't be considered high severity because it involves fonts . . . bounds checking? I'm asking you to explain the reasoning behind your assessment as if I was a student in a security 101 class.

                    hatter@metasocial.comH This user is from outside of this forum
                    hatter@metasocial.comH This user is from outside of this forum
                    hatter@metasocial.com
                    wrote last edited by
                    #22

                    @dangoodin @rootwyrm It seems like their Ai is discovering flaws that have already been patched - the exact mechanisms may not have been disclosed previously and claude now knows there may be unpatched code out there, and how to exploit the, because it''s done some kind of analysis of the applied patch. If you don't patch your systems regularly, you are still vulnerable to older exploits.

                    1 Reply Last reply
                    0
                    • rootwyrm@weird.autosR rootwyrm@weird.autos

                      @dangoodin the tl;dr is basically that they are making the completely bogus claim that they 'discovered' a vulnerability, because they found the commit, which was specifically to fix the already disclosed vulnerability.

                      This is as insane as claiming to have shockingly discovered someone has a dog after they texted you pictures of them holding a puppy, asked you for name suggestions, set up IG and YT accounts for the puppy you subscribe to, and you hosted a puppy party at your house.

                      mhitza@third-party.cyouM This user is from outside of this forum
                      mhitza@third-party.cyouM This user is from outside of this forum
                      mhitza@third-party.cyou
                      wrote last edited by
                      #23

                      @rootwyrm then it goes on and says that it found another code path that was similar to the fixed bug which was missing a necessary check.

                      @dangoodin here is the commit for GhostScript. I'm not an expert to assert on their claim of high severity
                      https://github.com/ArtifexSoftware/ghostpdl/commit/4e392a82d1b1780cab85804728317f36a9c4f7f7

                      1 Reply Last reply
                      0
                      • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                        Thanks for all the responses. So far, projects I understand to have received reports include: Ghostscript, OpenSC, lzw, and CGIF. Are others known? Links to commits that fix the vulns also appreciated.

                        mhitza@third-party.cyouM This user is from outside of this forum
                        mhitza@third-party.cyouM This user is from outside of this forum
                        mhitza@third-party.cyou
                        wrote last edited by
                        #24

                        @dangoodin the OpenSC commit that contains the highlighted code on the post https://github.com/OpenSC/OpenSC/commit/9ab1daf21029dd18f8828d684ee6151d9238edab . No detail about the fix and no security disclosure on the GitHub repository.

                        1 Reply Last reply
                        0
                        • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                          I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                          0-Days \ red.anthropic.com

                          favicon

                          (red.anthropic.com)

                          trode@hachyderm.ioT This user is from outside of this forum
                          trode@hachyderm.ioT This user is from outside of this forum
                          trode@hachyderm.io
                          wrote last edited by
                          #25

                          @dangoodin hearsay, but I heard the model used had reduced safeguards, which allowed it to be more aggressive

                          1 Reply Last reply
                          0
                          • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                            I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                            0-Days \ red.anthropic.com

                            favicon

                            (red.anthropic.com)

                            spaceinvader@social.securitytheater.netS This user is from outside of this forum
                            spaceinvader@social.securitytheater.netS This user is from outside of this forum
                            spaceinvader@social.securitytheater.net
                            wrote last edited by
                            #26

                            @dangoodin How popular/big were these OSS projects? There’s a big difference between finding a vuln in something like curl or Apache and my janky crap I pushed up to GitHub.

                            CVSS of 10/10 in my thing will impact one person, but in curl it’ll impact a few million more people. Including, still, me.

                            1 Reply Last reply
                            0
                            • rootwyrm@weird.autosR rootwyrm@weird.autos

                              @dangoodin zero question it's pure fantasy bullshit. They refuse to show their work, as usual. All they've got is a middling CGIF vulnerability that isn't, and claiming credit for "finding" a vulnerability in GhostScript because "hey this commit did a thing so they must have had a vulnerability!"

                              leberschnitzel@existiert.chL This user is from outside of this forum
                              leberschnitzel@existiert.chL This user is from outside of this forum
                              leberschnitzel@existiert.ch
                              wrote last edited by
                              #27

                              @rootwyrm according to their blog it didn't claim that it found the vulnerability in the commit, but checked the rest of the code base if the same vulnerability might be unpatched in other places, and it seems to have been.
                              My questions are more with some others here: how many false positives had the human experts need to wade through to get to the real vulnerabilities

                              @dangoodin

                              dangoodin@infosec.exchangeD 1 Reply Last reply
                              0
                              • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                                I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                                0-Days \ red.anthropic.com

                                favicon

                                (red.anthropic.com)

                                raymaccarthy@mastodon.ieR This user is from outside of this forum
                                raymaccarthy@mastodon.ieR This user is from outside of this forum
                                raymaccarthy@mastodon.ie
                                wrote last edited by
                                #28

                                @dangoodin
                                Anthropic have a lot of resources for PR and issue a lot of dubious and misleading statements?

                                1 Reply Last reply
                                0
                                • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                                  I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                                  0-Days \ red.anthropic.com

                                  favicon

                                  (red.anthropic.com)

                                  david_chisnall@infosec.exchangeD This user is from outside of this forum
                                  david_chisnall@infosec.exchangeD This user is from outside of this forum
                                  david_chisnall@infosec.exchange
                                  wrote last edited by
                                  #29

                                  @dangoodin

                                  There's a long history of doing fuzzy matching on patterns of known bugs to find more of the same kind. Coccinelle is the most well-known example of this. It was not actually written for vulnerability discovery, but it turns out that you could write patterns to patch a vulnerability and then it would find a load of similar ones.

                                  Few projects actually use it.

                                  OpenBSD has a policy that people who find security bugs should search for similar things in the code and fix them all. It turns out that humans who write a bug in one places are very likely to write the same bug elsewhere and this is no less true for bugs that lead to security vulnerabilities.

                                  It sounds like this is a pretty good use case for an LLM, because it is a tool for doing fuzzy matching on a token stream. Finding patches that fixed vulnerabilities and then looking for the 'before' shape in other places will find a load of things.

                                  With a bit of automation (sorry, 'agentic' use), you can do the following flow:

                                  • Find things that look like the 'before' state.
                                  • Apply a patch to make it look like the 'after' state.
                                  • Use guided fuzzing techniques to try to produce a test case that triggers the new checks introduced in the 'after' version.
                                  • If you find an example, flag it to the user as a potential security issue.

                                  It's probably very computationally expensive, but cheaper than having a human do the same thing (which is so expensive almost no one does it).

                                  1 Reply Last reply
                                  1
                                  0
                                  • R relay@relay.infosec.exchange shared this topic
                                  • leberschnitzel@existiert.chL leberschnitzel@existiert.ch

                                    @rootwyrm according to their blog it didn't claim that it found the vulnerability in the commit, but checked the rest of the code base if the same vulnerability might be unpatched in other places, and it seems to have been.
                                    My questions are more with some others here: how many false positives had the human experts need to wade through to get to the real vulnerabilities

                                    @dangoodin

                                    dangoodin@infosec.exchangeD This user is from outside of this forum
                                    dangoodin@infosec.exchangeD This user is from outside of this forum
                                    dangoodin@infosec.exchange
                                    wrote last edited by
                                    #30

                                    @leberschnitzel @rootwyrm

                                    Ah thanks. I knew I was missing something.

                                    1 Reply Last reply
                                    0
                                    • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                                      I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                                      0-Days \ red.anthropic.com

                                      favicon

                                      (red.anthropic.com)

                                      aburka@hachyderm.ioA This user is from outside of this forum
                                      aburka@hachyderm.ioA This user is from outside of this forum
                                      aburka@hachyderm.io
                                      wrote last edited by
                                      #31

                                      @dangoodin it reads as a threat

                                      1 Reply Last reply
                                      0
                                      • fritzadalis@infosec.exchangeF fritzadalis@infosec.exchange

                                        @GossiTheDog @dangoodin
                                        For #3 there are a bunch of recent commits to the lzw code.

                                        These really seem like bugs that existing scanners should have found, especially strcat use (#2).

                                        bertdriehuis@infosec.exchangeB This user is from outside of this forum
                                        bertdriehuis@infosec.exchangeB This user is from outside of this forum
                                        bertdriehuis@infosec.exchange
                                        wrote last edited by
                                        #32

                                        @FritzAdalis @GossiTheDog @dangoodin that’s the problem with human code review: humans just aren't that good at repetitive work (even though it stuns me that anyone who fixes an issue resulting from strcat() usage would not simply do a grep -r for other occurrences).

                                        I have read, and reread, all BER related code in netsnmp, and managed to miss a number of integer overruns - even though I was specifically looking for them. It's that experience that makes me such an advocate for languages such as Rust.

                                        1 Reply Last reply
                                        0
                                        • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                                          I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                                          0-Days \ red.anthropic.com

                                          favicon

                                          (red.anthropic.com)

                                          reverseics@infosec.exchangeR This user is from outside of this forum
                                          reverseics@infosec.exchangeR This user is from outside of this forum
                                          reverseics@infosec.exchange
                                          wrote last edited by
                                          #33

                                          @dangoodin I wrote up an analysis of the first 'vulnerability' they wrote about. it does not appear to be a vulnerability at all (sure the original code uses 'unsafe' functions, but you can't exploit anything as far as I can tell). https://infosec.exchange/@reverseics/116067178548980458 .

                                          I can't speak to the second vulnerability they wrote about, it would take me too long to determine whether it is a real or a hallucinated bug.

                                          1 Reply Last reply
                                          1
                                          0
                                          • R relay@relay.infosec.exchange shared this topic
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups