Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/3/2012
03:16 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Microsoft Fingers Chinese Firewall/IPS Vendor In Windows Exploit Leak

Chinese firewall and IPS vendor Hangzhou DPTech Technologies kicked out of Microsoft Active Protections Program (MAPP) for its role in disclosure of Windows Remote Desktop (RDP) flaw earlier this year

Microsoft today announced that it had rooted out the source of a leak from within its third-party security software firm partnership program that resulted in the weaponization of a bug in Windows -- raising questions about whether the Microsoft Active Protections Program (MAPP) could be vulnerable to other such breaches.

Chinese firewall and IPS vendor Hangzhou DPTech Technologies, according to Microsoft, was the culprit behind a rapid-fire turnaround of a working exploit for the Windows Remote Desktop (RDP) flaw in mid-March, just after the bug was patched by Microsoft. Microsoft said that Patch Tuesday had warned of possible attacks emerging quickly for the "critical" vulnerability because an attacker would be able to reverse-engineer its new patch for the RDP bug in relatively short order. That raised the potential for exploits to be written for a targeted attack or for automatic-propagation worms that would let attacks quickly take over systems within corporate networks for botnets. RDP is a tool used by IT departments to handle help-desk issues and by administrators to managed virtualized machines.

But just two days after Microsoft released the patch, there were reports that a working exploit for MS12-020 had been seen in China, indicating something was awry and that there could have been a leak from within MAPP. There was even a bounty of $1,500 circulating for the first person to build a Metasploit module for the bug.

Speculation of who leaked the vulnerability and proof-of-concept information on the RDP bug ranged from Italian researcher Luigi Auriemma, who originally discovered the flaw in 2011, to HP's Zero Day Initiative (ZDI), which purchased the bug from Auriemma in August 2011. Auriemma denied any involvement, and Aaron Portnoy, manager of security research at HP's ZDI, said in March that ZDI was "100% confident that the leaked information regarding MS12-020 did not come from the Zero Day Initiative."

[Microsoft Active Protections Program to include vulnerability information sharing from Adobe. See Microsoft, Adobe Collaborate To Protect Against Online Threats.]

Microsoft today was mum on how it ultimately rooted out DPTech as the source of the leak, or on just what Hangzhou DPTech Technologies did. "During our investigation into the disclosure of confidential data shared with our Microsoft Active Protections Program (MAPP) partners, we determined that a member of the MAPP program, Hangzhou DPTech Technologies Co., Ltd., had breached our non-disclosure agreement (NDA). Microsoft takes breaches of our NDAs very seriously and has removed this partner from the MAPP Program," said Yunsun Wee, director or Microsoft Trustworthy Computing, in a statement.

HD Moore, chief security officer at Rapid7 and creator of Metasploit, says it couldn't have been simple to trace the leak to a specific company. "[It's] interesting and somewhat surprising that they found it at all," Moore says.

Meanwhile, the announcement by Microsoft appears to raise more questions than answers. Concerns about a Chinese security vendor leaking Windows vulnerability details before the patch window had closed, and whether this was truly the first breach of the MAPP program, sent a chill through the industry.

"Yes, it is a little concerning that it was a Chinese firm that leaked the Microsoft information. That being said, what did Microsoft really expect was going to happen? The Chinese do not have a very good track record of adhering to NDA and other agreements," says Paul Henry, security and forensic analyst at Lumension. "It is important to recognize that the MAPP program is relatively new, so there will be bumps in the road as Microsoft works out the delicate balance between strategic sharing and safeguarding the distribution of sensitive information regarding its products."

Microsoft's Wee said that as of this month's Patch Tuesday release, Microsoft has beefed up its current controls around protecting MAPP information. "We believe that these enhancements will better protect our information, while furthering customer protection by aiding partners developing active protections," he said. Microsoft declined to provide any details beyond Wee's statements.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Andacar
50%
50%
Andacar,
User Rank: Apprentice
5/4/2012 | 6:53:03 PM
re: Microsoft Fingers Chinese Firewall/IPS Vendor In Windows Exploit Leak
What we have done is put short term profits ahead of all other considerations. The CEOs who are shipping American manufacturing jobs, technology and know-how overseas in the interest of seeing a quick rise in stock prices have put their necks in this noose. What else do you expect if you are a company that allegedly sells security if you give your enemy the keys to the castle?
bth
50%
50%
bth,
User Rank: Apprentice
5/4/2012 | 2:46:34 PM
re: Microsoft Fingers Chinese Firewall/IPS Vendor In Windows Exploit Leak
Greed and stupidity.- But mostly greed.
lancop
50%
50%
lancop,
User Rank: Apprentice
5/4/2012 | 2:36:47 PM
re: Microsoft Fingers Chinese Firewall/IPS Vendor In Windows Exploit Leak
"Trust, but verify." Well, maybe not. Like Pakistan sheltering the Taliban & Osama Bin Laden, China is also playing both sides of the table at all times. Because they manufacture most of the IT infrastructure that we all rely on, they are in a unique position to exploit network vulnerabilities even shortly after they have been patched. This should give us pause: is there really any such thing as "private information" any more? High profile hacks to high security companies like RSA prove that any computer network that is attached to the Internet is, ultimately, hackable by those with the means, motive and opportunity to try. The West does NOT control the Information Age anymore, and information is only of REAL value to those in a position to act on it. The Global Supply Chain & Capital Funding systems are increasingly converged in China, who is in the most ideal position to act on stolen intellectual property. What have we done to ourselves, and why have we done this?
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18202
PUBLISHED: 2019-10-19
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
CVE-2019-18209
PUBLISHED: 2019-10-19
templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
CVE-2019-18198
PUBLISHED: 2019-10-18
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
CVE-2019-18197
PUBLISHED: 2019-10-18
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclo...
CVE-2019-4409
PUBLISHED: 2019-10-18
HCL Traveler versions 9.x and earlier are susceptible to cross-site scripting attacks. On the Problem Report page of the Traveler servlet pages, there is a field to specify a file attachment to provide additional problem details. An invalid file name returns an error message that includes the entere...