Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

Bugs versus vulnerabilities?

Tags:

security

What, if any, is the difference between a software bug and a software vulnerability?

like image 620
romandas Avatar asked Dec 31 '08 13:12

romandas


People also ask

What is vulnerability and bug?

Put simply, a bug is when the system isn't behaving as it's supposed to, whereas a vulnerability is a bug that manifests itself as an opportunity for exploitation. So while Apple's “text bomb” is a bug, Intel's “Meltdown” is a vulnerability, and therefore a more serious threat.

Are security vulnerabilities bugs?

A security bug is specifically a bug that causes a vulnerability. A vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.

Are all bugs vulnerabilities?

Vulnerability is a subset of bug. A bug is any defect in a product. A vulnerability is bug that manifests as an opportunity for malicious use of the product. Vulnerabilities generally are not that clearly evident, but require ingenuity to be exploited.

What is bug in cyber security?

A bug is a flaw or vulnerability in the software or hardware design that can be potentially exploited by the attackers. These security bugs can be used to exploit various vulnerabilities by compromising – user authentication, authorization of access rights and privileges, data confidentiality, and data integrity.


2 Answers

A bug is when a system isn't behaving as it's designed to behave.

A vulnerability is a way of abusing the system (most commonly in a security-related way) - whether that's due to a design fault or an implementation fault. In other words, something can have a vulnerability due to a defective design, even if the implementation of that design is perfect.

like image 134
Jon Skeet Avatar answered Oct 23 '22 19:10

Jon Skeet


Vulnerability is a subset of bug.

A bug is any defect in a product.

A vulnerability is bug that manifests as an opportunity for malicious use of the product. Vulnerabilities generally are not that clearly evident, but require ingenuity to be exploited.

like image 36
Frederick The Fool Avatar answered Oct 23 '22 20:10

Frederick The Fool