Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/19/2013
04:06 PM
50%
50%

Microsoft Establishes Rewards Programs For Windows 8.1, Internet Explorer 11 Preview Security Bugs

Microsoft is launching new programs to get its hands on cutting-edge exploits developed by researchers

Microsoft has gotten into the market for software vulnerabilities.

Click here for more of Dark Reading's Black Hat articles.

Starting June 26, Microsoft will launch three new rewards programs for researchers to encourage bug finders to report exploitation techniques and defensive solutions. The first program is the Mitigation Bypass Bounty, in which Microsoft has agreed to pay up to $100,000 for exploits targeting the latest version of Windows (Windows 8.1 Preview). The second program -- the "BlueHat Bonus for Defense" -- offers up to $50,000 for defensive ideas that accompany any submission for the first program.

The final program offers up to $11,000 for critical vulnerabilities affecting the Internet Explorer 11 Preview on Windows 8.1. The entry period for this program will be the first 30 days of the IE 11 beta period, which stretches from June 26 to July 26. The other programs will remain ongoing.

"For the first time ever, Microsoft is offering direct cash payouts in exchange for reporting certain types of vulnerabilities and exploitation techniques," blogs Katie Moussouris, senior security strategist at Microsoft's Security Research Center. "We are making this shift in order to learn about these issues earlier and to increase the win-win between Microsoft's customers and the security researcher community."

"Our platform-wide mitigations (DEP, ASLR, and so forth) are part of "the shield" that increases costs to attackers by making it difficult to reliably exploit individual vulnerabilities," she continues, adding that while annual exploit competitions have allow Microsoft and other vendors to learn about new attack techniques, those competitions are not enough.

"We decided that we didn't want to wait for the next competition to learn about more of these new exploitation techniques – we want to know about them before they are used to target our customers," blogs Moussouris. "For Microsoft, learning about mitigation bypasses on our latest platform, or "holes in the shield," helps us better protect against entire classes of attacks and can help us move the state of security in our products by leaps, rather than by small increments that a traditional bug bounty alone would."

At the upcoming Black Hat conference in Las Vegas, Microsoft will invite anyone who wants to participate in the Mitigation Bypass Bounty to do so live during the convention next month.

It is no secret there is a thriving marketplace for zero-day vulnerabilities in popular software. With bugs going for thousands of dollars in the cyberunderground, bounty programs can serve as a way for vendors to lure those who may be tempted to sell them to bad actors, as well as security experts looking to profit from their research legitimately.

"I think the mitigation bypass bounty of $100,000 is enough to incent some people to give their research to Microsoft instead of trying to build zero-days for the black market with the same information," opines Chris Wysopal, CTO of Veracode. "There are many researchers who come from an academic background or are otherwise looking to build a career in info security who don't want to associate with the black market."

"Bug bounties signal to the security community that a vendor respects security researchers work so much they are willing to pay for it," he adds. "The way Microsoft has structured the mitigation bypass bounty means they will be getting research that allows them to improve the entire windows platform which will make even non-Microsoft vendor software more secure."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Brian Prince is a freelance writer for a number of IT security-focused publications. Prior to becoming a freelance reporter, he worked at eWEEK for five years covering not only security, but also a variety of other subjects in the tech industry. Before that, he worked as a ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
Preventing PTSD and Burnout for Cybersecurity Professionals
Craig Hinkley, CEO, WhiteHat Security,  9/16/2019
NetCAT Vulnerability Is Out of the Bag
Dark Reading Staff 9/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3738
PUBLISHED: 2019-09-18
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to an Improper Verification of Cryptographic Signature vulnerability. A malicious remote attacker could potentially exploit this vulnerability to coerce two parties into computing the same predictable shared key.
CVE-2019-3739
PUBLISHED: 2019-09-18
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to Information Exposure Through Timing Discrepancy vulnerabilities during ECDSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover ECDSA keys.
CVE-2019-3740
PUBLISHED: 2019-09-18
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to an Information Exposure Through Timing Discrepancy vulnerabilities during DSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover DSA keys.
CVE-2019-3756
PUBLISHED: 2019-09-18
RSA Archer, versions prior to 6.6 P3 (6.6.0.3), contain an information disclosure vulnerability. Information relating to the backend database gets disclosed to low-privileged RSA Archer users' UI under certain error conditions.
CVE-2019-3758
PUBLISHED: 2019-09-18
RSA Archer, versions prior to 6.6 P2 (6.6.0.2), contain an improper authentication vulnerability. The vulnerability allows sysadmins to create user accounts with insufficient credentials. Unauthenticated attackers could gain unauthorized access to the system using those accounts.