Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/3/2012
03:16 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Microsoft Fingers Chinese Firewall/IPS Vendor In Windows Exploit Leak

Chinese firewall and IPS vendor Hangzhou DPTech Technologies kicked out of Microsoft Active Protections Program (MAPP) for its role in disclosure of Windows Remote Desktop (RDP) flaw earlier this year

Microsoft today announced that it had rooted out the source of a leak from within its third-party security software firm partnership program that resulted in the weaponization of a bug in Windows -- raising questions about whether the Microsoft Active Protections Program (MAPP) could be vulnerable to other such breaches.

Chinese firewall and IPS vendor Hangzhou DPTech Technologies, according to Microsoft, was the culprit behind a rapid-fire turnaround of a working exploit for the Windows Remote Desktop (RDP) flaw in mid-March, just after the bug was patched by Microsoft. Microsoft said that Patch Tuesday had warned of possible attacks emerging quickly for the "critical" vulnerability because an attacker would be able to reverse-engineer its new patch for the RDP bug in relatively short order. That raised the potential for exploits to be written for a targeted attack or for automatic-propagation worms that would let attacks quickly take over systems within corporate networks for botnets. RDP is a tool used by IT departments to handle help-desk issues and by administrators to managed virtualized machines.

But just two days after Microsoft released the patch, there were reports that a working exploit for MS12-020 had been seen in China, indicating something was awry and that there could have been a leak from within MAPP. There was even a bounty of $1,500 circulating for the first person to build a Metasploit module for the bug.

Speculation of who leaked the vulnerability and proof-of-concept information on the RDP bug ranged from Italian researcher Luigi Auriemma, who originally discovered the flaw in 2011, to HP's Zero Day Initiative (ZDI), which purchased the bug from Auriemma in August 2011. Auriemma denied any involvement, and Aaron Portnoy, manager of security research at HP's ZDI, said in March that ZDI was "100% confident that the leaked information regarding MS12-020 did not come from the Zero Day Initiative."

[Microsoft Active Protections Program to include vulnerability information sharing from Adobe. See Microsoft, Adobe Collaborate To Protect Against Online Threats.]

Microsoft today was mum on how it ultimately rooted out DPTech as the source of the leak, or on just what Hangzhou DPTech Technologies did. "During our investigation into the disclosure of confidential data shared with our Microsoft Active Protections Program (MAPP) partners, we determined that a member of the MAPP program, Hangzhou DPTech Technologies Co., Ltd., had breached our non-disclosure agreement (NDA). Microsoft takes breaches of our NDAs very seriously and has removed this partner from the MAPP Program," said Yunsun Wee, director or Microsoft Trustworthy Computing, in a statement.

HD Moore, chief security officer at Rapid7 and creator of Metasploit, says it couldn't have been simple to trace the leak to a specific company. "[It's] interesting and somewhat surprising that they found it at all," Moore says.

Meanwhile, the announcement by Microsoft appears to raise more questions than answers. Concerns about a Chinese security vendor leaking Windows vulnerability details before the patch window had closed, and whether this was truly the first breach of the MAPP program, sent a chill through the industry.

"Yes, it is a little concerning that it was a Chinese firm that leaked the Microsoft information. That being said, what did Microsoft really expect was going to happen? The Chinese do not have a very good track record of adhering to NDA and other agreements," says Paul Henry, security and forensic analyst at Lumension. "It is important to recognize that the MAPP program is relatively new, so there will be bumps in the road as Microsoft works out the delicate balance between strategic sharing and safeguarding the distribution of sensitive information regarding its products."

Microsoft's Wee said that as of this month's Patch Tuesday release, Microsoft has beefed up its current controls around protecting MAPP information. "We believe that these enhancements will better protect our information, while furthering customer protection by aiding partners developing active protections," he said. Microsoft declined to provide any details beyond Wee's statements.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Andacar
50%
50%
Andacar,
User Rank: Apprentice
5/4/2012 | 6:53:03 PM
re: Microsoft Fingers Chinese Firewall/IPS Vendor In Windows Exploit Leak
What we have done is put short term profits ahead of all other considerations. The CEOs who are shipping American manufacturing jobs, technology and know-how overseas in the interest of seeing a quick rise in stock prices have put their necks in this noose. What else do you expect if you are a company that allegedly sells security if you give your enemy the keys to the castle?
bth
50%
50%
bth,
User Rank: Apprentice
5/4/2012 | 2:46:34 PM
re: Microsoft Fingers Chinese Firewall/IPS Vendor In Windows Exploit Leak
Greed and stupidity.- But mostly greed.
lancop
50%
50%
lancop,
User Rank: Apprentice
5/4/2012 | 2:36:47 PM
re: Microsoft Fingers Chinese Firewall/IPS Vendor In Windows Exploit Leak
"Trust, but verify." Well, maybe not. Like Pakistan sheltering the Taliban & Osama Bin Laden, China is also playing both sides of the table at all times. Because they manufacture most of the IT infrastructure that we all rely on, they are in a unique position to exploit network vulnerabilities even shortly after they have been patched. This should give us pause: is there really any such thing as "private information" any more? High profile hacks to high security companies like RSA prove that any computer network that is attached to the Internet is, ultimately, hackable by those with the means, motive and opportunity to try. The West does NOT control the Information Age anymore, and information is only of REAL value to those in a position to act on it. The Global Supply Chain & Capital Funding systems are increasingly converged in China, who is in the most ideal position to act on stolen intellectual property. What have we done to ourselves, and why have we done this?
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19619
PUBLISHED: 2019-12-06
domain/section/markdown/markdown.go in Documize before 3.5.1 mishandles untrusted Markdown content. This was addressed by adding the bluemonday HTML sanitizer to defend against XSS.
CVE-2019-19616
PUBLISHED: 2019-12-06
An Insecure Direct Object Reference (IDOR) vulnerability in the Xtivia Web Time and Expense (WebTE) interface used for Microsoft Dynamics NAV before 2017 allows an attacker to download arbitrary files by specifying arbitrary values for the recId and filename parameters of the /Home/GetAttachment fun...
CVE-2019-19617
PUBLISHED: 2019-12-06
phpMyAdmin before 4.9.2 does not escape certain Git information, related to libraries/classes/Display/GitRevision.php and libraries/classes/Footer.php.
CVE-2012-1114
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the filter parameter to cmd.php in an export and exporter_id action. and the filteruid parameter to list.php.
CVE-2012-1115
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the export, add_value_form, and dn parameters to cmd.php.