Vulnerabilities / Threats
6/19/2013
03:31 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Microsoft Dangles $100,000 Bug Bounty

One hitch: The bugs might be worth more on the open market.

Google Apps To Microsoft Office 365: 10 Lessons
Google Apps To Microsoft Office 365: 10 Lessons
(click image for larger view and for slideshow)
Microsoft on Wednesday said it will begin offering payments of up to $100,000 for "truly novel exploitation techniques" that defeat security protections in Windows 8.1 Preview, the latest version of the company's popular desktop operating system.

As part of the Microsoft Mitigation Bypass Bounty program, the company is also offering up to $50,000 for defensive strategies that mitigate accepted exploits. Microsoft isn't paying for any old bugs; it is specifically interested in exploits that defeat Windows security technologies such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR).

In addition, during the beta period between June 26 and July 26, Microsoft will pay up to $11,000 for critical vulnerabilities that affect Internet Explorer 11 Preview.

Windows has long been the dominant operating system on personal computers and, as a result, remains a major target for cybercriminals. Over a decade ago, Microsoft began trying to address the concerted assault on its operating system with its Trustworthy Computing initiative, the result of a directive from Bill Gates, then CEO of the company. The company expanded its commitment to security with programs that followed such as Secure Development Lifecycle and the coordination of industry collaboration programs.

[ Are your Dynamics apps on third-party hosts? Read Microsoft Dynamics Apps Hit Azure Cloud. ]

Although Microsoft clearly recognizes the risk and the value of vulnerabilities -- it provides information about flaws to government agencies before releasing that information to the public -- it has only just awoken to the value of recognizing those who find vulnerabilities.

Mozilla has been offering rewards to security researchers who find bugs in its code since 2004. Google launched its Chrome bug bounty program in late 2010 and has since paid out $828,000 to over 250 researchers. Facebook introduced a bug bounty program in July 2011.

Dozens of companies offer rewards or acknowledgements of some sort to those who provide information about security vulnerabilities. But in the past few years, that recognition has not kept pace with the value of exploit information. Google recently increased its rewards, but a Forbes report last year suggests that quality zero-day vulnerabilities can be sold for $250,000 or more.

"I am a little surprised that it took Microsoft this long to create a bug bounty program," said Chris Wysopal, co-founder and CTO of Veracode, in a blog post. "They seem to be jumping in with a second-generation bug bounty program putting the emphasis on exploitation and valuable mitigation techniques. On the open market these techniques could be used to build many zero-day exploits and [could] possibly command more than the Microsoft bounty..."

At the Black Hat USA 2013 conference, scheduled for July 27-Aug. 1, Microsoft plans to invite anyone who wants to participate in its Mitigation Bypass Bounty to do so live before its judging committee in the Black Hat Sponsor Hall. Black Hat is operated by UBM TechWeb, which also owns InformationWeek.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5619
Published: 2014-09-29
The Sleuth Kit (TSK) 4.0.1 does not properly handle "." (dotfile) file system entries in FAT file systems and other file systems for which . is not a reserved name, which allows local users to hide activities it more difficult to conduct forensics activities, as demonstrated by Flame.

CVE-2012-5621
Published: 2014-09-29
lib/engine/components/opal/opal-call.cpp in ekiga before 4.0.0 allows remote attackers to cause a denial of service (crash) via an OPAL connection with a party name that contains invalid UTF-8 strings.

CVE-2012-6107
Published: 2014-09-29
Apache Axis2/C does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

CVE-2012-6110
Published: 2014-09-29
bcron-exec in bcron before 0.10 does not close file descriptors associated with temporary files when running a cron job, which allows local users to modify job files and send spam messages by accessing an open file descriptor.

CVE-2013-1874
Published: 2014-09-29
Untrusted search path vulnerability in csi in Chicken before 4.8.2 allows local users to execute arbitrary code via a Trojan horse .csirc in the current working directory.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.