Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:55 AM
Connect Directly

New Microsoft Program Helps Fix Third-Party Vulnerabilities

Microsoft to officially share with Windows third-party app vendors flaws it finds in their software

LAS VEGAS – Black Hat USA – Microsoft yesterday launched a program to help third-party Windows application vendors fix security flaws in their software. Under the new Microsoft Vulnerability Research (MSVR) program, Microsoft will share with those vendors vulnerabilities discovered by Microsoft researchers or outside researchers in these third-party products.

“We are extending security [research and resolution] to the Windows ecosystem,” says Mike Reavey, group manager for the Microsoft Security Response Center. “We wanted to formalize how we report to these vendors to share and leverage” Microsoft’s security resources.

The program reflects the shift in attack trends, with more exploits going after these third-party Windows apps, he says: Over 80 percent of exploits affecting XP systems are against third-party Windows apps, and over 90 percent affecting Vista systems are aimed at third-party Windows apps, according to Reavey.

Microsoft’s security experts find these vulnerabilities in third-party apps while working on their own research, or during the Security Development Lifecycle process. Reavey says a good example of how the MSVR process would work is the recent Apple Safari and Windows blended threat, which was initially discovered by an outside researcher who reported it to Microsoft: “We were able to work with Apple” to resolve it.

With MSVR, when Microsoft finds vulnerability in a third-party application, it would officially report it to the affected vendor and then help the vendor resolve it.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Microsoft Corp. (Nasdaq: MSFT)

    Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Why Cyber-Risk Is a C-Suite Issue
    Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
    Unreasonable Security Best Practices vs. Good Risk Management
    Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
    Breaches Are Inevitable, So Embrace the Chaos
    Ariel Zeitlin, Chief Technology Officer & Co-Founder, Guardicore,  11/13/2019
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Current Issue
    Navigating the Deluge of Security Data
    In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
    Flash Poll
    Rethinking Enterprise Data Defense
    Rethinking Enterprise Data Defense
    Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2019-11-15
    An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A heap-based buffer overflow allows remote attackers to cause a denial of service or execute arbitrary ...
    PUBLISHED: 2019-11-15
    An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A stack overflow could lead to denial of service or arbitrary code execution.
    PUBLISHED: 2019-11-15
    On version 14.0.0-, BIG-IP virtual servers with TLSv1.3 enabled may experience a denial of service due to undisclosed incoming messages.
    PUBLISHED: 2019-11-15
    On BIG-IP 14.1.0-14.1.2, 14.0.0-14.0.1, and 13.1.0-13.1.1, undisclosed HTTP requests may consume excessive amounts of systems resources which may lead to a denial of service.
    PUBLISHED: 2019-11-15
    When the BIG-IP APM 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-, 12.1.0-, or 11.5.1-11.6.5 system processes certain requests, the APD/APMD daemon may consume excessive resources.