Risk
4/21/2011
05:12 PM
50%
50%

Microsoft Updates Vulnerability Disclosure Policies

The software company clarifies its vulnerability-handling guidelines and begins issuing security bulletins for third-party products.

Strategic Security Survey: Global Threat, Local Pain
Strategic Security Survey: Global Threat, Local Pain
(click image for larger view and for full slideshow)
Microsoft wants to sell you on coordinated vulnerability disclosures.

The company released new vulnerability disclosure policies on Tuesday. In particular, Microsoft updated its coordinated vulnerability disclosure (CVD) document, which details how it works with vulnerability researchers. The document was first introduced in July 2010.

"The new CVD procedures delineate very carefully what all parties can expect from Microsoft in the vulnerability disclosure process," said Andrew Storms, director of security operations for nCircle, in an email interview. "It's the first time a vendor has defined the various roles in a vulnerability disclosure and management process and created a set of deliverables for each role."

In addition, Microsoft has revised its staff guidelines. While employees were formerly encouraged to report any vulnerabilities they find in external products to the company's Microsoft Security Resource Center (MSRC), it's now mandatory. "We've also made sure that there's a team that can help them, and that's the Microsoft Vulnerability Research team"--aka MSVR--said Mike Reavey, director of the MSRC, in an interview. MSVR is the group at Microsoft that, as detailed in the CVD, works with external security researchers who report vulnerabilities to Microsoft.

For the first time, Microsoft has also begun to release public advisories for third-party products, and when possible coordinating the release of that information after the vendor has crafted a fix. On Tuesday, the company detailed one bug affecting Google Chrome and Opera, and another that just affected Chrome. Both have been patched.

All of these moves by Microsoft are aimed at bolstering uptake of coordinated vulnerability disclosures, in which vulnerability researchers share information about bugs they've discovered with the relevant vendor, then wait to disclose the vulnerability publicly until a patch has been released. This approach was formerly dubbed "responsible disclosure," but Microsoft gave it a makeover. "The main reason for that shift was because the word 'responsible' evoked a lot of emotional responses for people," said Reavey.

As that suggests, there's some debate amongst vulnerability researchers about the best way to disclose vulnerabilities. Proponents of rapid disclosure--aka not waiting for vendors--often claim that it leads to bugs being fixed more quickly. They also note that if they've found it, attackers may already have found and been exploiting the vulnerability too. According to Microsoft, however, "drawing upon our years of experience, we have seen that disclosing vulnerability details and/or exploits before a vendor has a chance to address the issue amplifies the risk of attacks."

Interestingly, while Microsoft's new CVD commits the organization to the path of coordinated disclosures, Microsoft said it will publicly detail vulnerabilities in cases where the vendor is unresponsive and related attacks are already underway.

But one component lacking from Microsoft's revised CVD, said some security experts, is a concrete timeframe for fixes.

Another criticism, at least historically, has been the difficulty of connecting with Microsoft vulnerability remediation staff. But security experts said that Microsoft has been improving. "For the past two years or so, I've seen a great improvement in the way Microsoft handles vulnerabilities. Still, sometimes the time to fix is high, since there are too many bug reports and it is very hard to prioritize," said Rodrigo Branco, vulnerability and malware research director at Qualys, in an email interview.

Another route for making contact with Microsoft, furthermore, is through a computer emergency readiness team (CERT), said Branco. He said this is an excellent approach--in general--if a vulnerability researcher is having difficult getting "their vulnerabilities accepted by vendors, especially if both researcher and vendor have had little prior exposure to the process." Using a third party such as a CERT helps both with notification and influencing a vendor to tackle the problem.

Overall, many security experts said Microsoft is doing a relatively good job of improving the security of its products, both through secure software development practices, as well as mitigating bugs in its products relatively quickly. "If you take into consideration that Microsoft doesn't pay for bugs like Google Chrome, then from my viewpoint, it looks like they are doing a pretty good job," said nCircle's Storms.

He also recommends that security executives take a cue from how Microsoft has detailed its security vulnerability policies, to likewise set their own "clear expectations and enforceable guidelines" for their company's employees should disclose bugs.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: So...are we supposed to be the elves or the reindeer?
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.