Vulnerabilities / Threats
6/19/2013
04:06 PM
Connect Directly
RSS
E-Mail
50%
50%

Microsoft Establishes Rewards Programs For Windows 8.1, Internet Explorer 11 Preview Security Bugs

Microsoft is launching new programs to get its hands on cutting-edge exploits developed by researchers

Microsoft has gotten into the market for software vulnerabilities.

Click here for more of Dark Reading's Black Hat articles.

Starting June 26, Microsoft will launch three new rewards programs for researchers to encourage bug finders to report exploitation techniques and defensive solutions. The first program is the Mitigation Bypass Bounty, in which Microsoft has agreed to pay up to $100,000 for exploits targeting the latest version of Windows (Windows 8.1 Preview). The second program -- the "BlueHat Bonus for Defense" -- offers up to $50,000 for defensive ideas that accompany any submission for the first program.

The final program offers up to $11,000 for critical vulnerabilities affecting the Internet Explorer 11 Preview on Windows 8.1. The entry period for this program will be the first 30 days of the IE 11 beta period, which stretches from June 26 to July 26. The other programs will remain ongoing.

"For the first time ever, Microsoft is offering direct cash payouts in exchange for reporting certain types of vulnerabilities and exploitation techniques," blogs Katie Moussouris, senior security strategist at Microsoft's Security Research Center. "We are making this shift in order to learn about these issues earlier and to increase the win-win between Microsoft's customers and the security researcher community."

"Our platform-wide mitigations (DEP, ASLR, and so forth) are part of "the shield" that increases costs to attackers by making it difficult to reliably exploit individual vulnerabilities," she continues, adding that while annual exploit competitions have allow Microsoft and other vendors to learn about new attack techniques, those competitions are not enough.

"We decided that we didn't want to wait for the next competition to learn about more of these new exploitation techniques – we want to know about them before they are used to target our customers," blogs Moussouris. "For Microsoft, learning about mitigation bypasses on our latest platform, or "holes in the shield," helps us better protect against entire classes of attacks and can help us move the state of security in our products by leaps, rather than by small increments that a traditional bug bounty alone would."

At the upcoming Black Hat conference in Las Vegas, Microsoft will invite anyone who wants to participate in the Mitigation Bypass Bounty to do so live during the convention next month.

It is no secret there is a thriving marketplace for zero-day vulnerabilities in popular software. With bugs going for thousands of dollars in the cyberunderground, bounty programs can serve as a way for vendors to lure those who may be tempted to sell them to bad actors, as well as security experts looking to profit from their research legitimately.

"I think the mitigation bypass bounty of $100,000 is enough to incent some people to give their research to Microsoft instead of trying to build zero-days for the black market with the same information," opines Chris Wysopal, CTO of Veracode. "There are many researchers who come from an academic background or are otherwise looking to build a career in info security who don't want to associate with the black market."

"Bug bounties signal to the security community that a vendor respects security researchers work so much they are willing to pay for it," he adds. "The way Microsoft has structured the mitigation bypass bounty means they will be getting research that allows them to improve the entire windows platform which will make even non-Microsoft vendor software more secure."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Brian Prince is a freelance writer for a number of IT security-focused publications. Prior to becoming a freelance reporter, he worked at eWEEK for five years covering not only security, but also a variety of other subjects in the tech industry. Before that, he worked as a ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2942
Published: 2014-09-22
Cobham Aviator 700D and 700E satellite terminals use an improper algorithm for PIN codes, which makes it easier for attackers to obtain a privileged terminal session by calculating the superuser code, and then leveraging physical access or terminal access to enter this code.

CVE-2014-5522
Published: 2014-09-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-6025. Reason: This candidate is a reservation duplicate of CVE-2014-6025. Notes: All CVE users should reference CVE-2014-6025 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2014-5523
Published: 2014-09-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5524. Reason: This candidate is a duplicate of CVE-2014-5524. Notes: All CVE users should reference CVE-2014-5524 instead of this candidate. All references and descriptions in this candidate have been removed to prevent acciden...

CVE-2014-5575
Published: 2014-09-22
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

CVE-2014-5665
Published: 2014-09-22
The Mzone Login (aka com.mr384.MzoneLogin) application 1.2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio