Application Security
6/11/2010
11:52 AM
Connect Directly
RSS
E-Mail
50%
50%

Microsoft Security Vulnerability Disclosed

A Google security researcher revealed the flaw; Microsoft may release out-of-cycle fix.

Microsoft was left racing to patch a Windows Help and Support Center vulnerability after Tavis Ormandy, an information security researcher who's charged with keeping Google's products secure, Thursday publicly disclosed both the bug as well as proof-of-concept attack code.

Ormandy reportedly informed Microsoft of the vulnerability on Saturday, June 5, and Microsoft acknowledged receipt the same day. Five days later, however, Ormandy went public with a posting to the Full Disclosure mailing list. Later that day, Microsoft issued its own vulnerability announcement.

The vulnerability affects at least Windows XP and Windows Server 2003. Potentially any software using or linking to the Help Center -- including e-mail and Word documents -- is an attack vector, and users might not even notice they'd been attacked.

"Perhaps the only unavoidable signal would be the momentary appearance of the Help Center window before the attacker hides it," disclosed Ormandy. "There are multiple, trivial techniques that can be used to accomplish this."

In its vulnerability announcement, Microsoft said that it was "aware that proof of concept exploit code has been published for the vulnerability" but that it had so far not seen "active attacks that use this exploit code." The company said it would issue an out-of-cycle security patch, if required. Until then, as a workaround, it released instructions for disabling the HCP Protocol. As a side effect, however, this would break all links to the Help Center on a PC.

This is not the first bug to be spotted by Ormandy, who also serves as co-lead of the Gentoo Linux security team, or the first vulnerability announcement he's made outside of back channels. In January, he disclosed a vulnerability -- as well as a workaround -- against a 17-year-old bug in Windows, noting at the time that he chose to publish immediately, instead of waiting for Microsoft to issue a patch. In the past, he's also discovered flaws in Gentoo Linux as well as Sun's Java.

His reasoning for going public with this bug, rather than waiting for Microsoft to fix it? "I would like to point out that if I had reported the MPC::HexToNum() issue without a working exploit, I would have been ignored," he wrote in the vulnerability disclosure. Furthermore, he said, disclosing the bug now would help provide a more rapid way to mitigate the threat.

Too often, he said, "those of us who work hard to keep networks safe are forced to work in isolation without the open collaboration with our peers that we need, especially in complex cases like this, where creative thinking and input from experts in multiple disciplines is required to join the dots."

Some, however, have questioned the timing. "Five days' notice for Microsoft to fix the problem hardly seems like a reasonable amount of time to me," said Graham Cluley, a security researcher at Sophos. "Although Ormandy states in his Full Disclosure post that he does 'not speak or represent anyone but myself,' it's no surprise that some are wondering whether this was a responsible way for a Google employee to behave."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.