Datamation Logo

Hackers Take Shots at Microsoft Security Response

July 7, 2010
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

A group of hackers says it will begin anonymously releasing proof-of-concept exploit code for Microsoft vulnerabilities in retaliation for the software giant’s recent criticism of third-party security researchers.

And to show how serious its members are, the group — which has taken the name Microsoft-Spurned Researcher Collective, usurping the acronym for Microsoft’s (NASDAQ: MSFT) own security team, has already released code demonstrating a newly discovered exploit in Windows Vista and Windows Server 2008.

Microsoft, as well as other companies, relies on third-party security researchers for warnings about vulnerabilities in its software. However, the software industry also has taken researchers to task for revealing the details of a potential security hole before affected vendors have had time to issue a patch.

Most recently, Google security researcher Tavis Ormandy, on at least two occasions in the past six months, publicly disclosed security vulnerabilities as well as proof-of-concept code that demonstrates how to exploit them. For example, Ormandy released code last month that ultimately led to more than 10,000 separate attacks on vulnerable computers. That security flaw emanates from the way Windows XP handles files in its Help and Support Center.

Ormandy’s efforts served to stir up the long-lasting controversy over whether security researchers should wait to disclose the software exploits they discover to the public — and potentially, to nefarious hackers — before they notify the software’s developer. Many researchers have argued that the threat of public disclosure spurs software vendors to action; otherwise, the thinking goes, they wouldn’t bother to update their products in a timely fashion.

The Microsoft-Spurned Researcher Collective is also challenging what it describes as a combative attitude among software vendors toward independent and third-party security researchers.

“Due to hostility toward security researchers, the most recent example being of Tavis Ormandy, a number of us from the industry (and some not from the industry) have come together to form MSRC: the Microsoft-Spurned Researcher Collective,” the newly formed group said in a post to the Full Disclosure security mailing list last week. “MSRC will fully disclose vulnerability information discovered in our free time, free from retaliation against us or any inferred employer.”

But Jerry Bryant, group manager for response communications at the Microsoft Security Response Center, said in an e-mail to InternetNews.com that his company calls for “responsible disclosure” by security researchers.

“Reporting vulnerabilities directly to vendors helps to ensure that potentially affected customers receive high-quality, comprehensive updates before cybercriminals learn of a vulnerability, and work to exploit it,” he said.

In last month’s incident, some bloggers also took Ormandy and his employer, Google, to task for not having disclosed the vulnerability and proof-of-concept to Microsoft in time for it to act before Ormandy published details of the security hole on the Internet.

According to Ormandy’s post, he gave Microsoft five days warning before revealing details of the Help and Support Center vulnerability online.

Others, meanwhile, said the industry needs to strike a balance.

“While these attacks are very serious, it strikes me as some classic PR on Microsoft’s part to release a statistic like this [the 10,000 attacks enabled by Ormandy’s disclosure] while trying to blame Google for Tavis’s ‘irresponsible disclosure’,” Sophos Senior Security Advisor Chester Wisniewski said in a post on his firm’s blog last week.

“I am not taking sides here, but what would seem to best serve the community is an open, honest discussion among the parties involved where we can all learn from this incident,” Wisniewski added.

That doesn’t seem to be in the cards any time soon, however. The MSRC hackers group did not pre-notify Microsoft before releasing the latest exploit in their post to the Full Disclosure mailing list.

New vulnerability in Windows Server 2008, Vista

Although Microsoft has not yet released a Security Advisory for the new hole revealed by the group, a spokesperson for the company said the problem is not as serious as many others.

“Microsoft is currently investigating the public disclosure of a vulnerability affecting Windows Vista and Windows Server 2008. Our initial analysis of the proof-of-concept code supplied has determined that an attacker must be able to log on locally, or already have code running on the target system, in order to cause a local denial of service,” Bryant said in his e-mail.

Stuart J. Johnston is a contributing writer at InternetNews.com, the news service of Internet.com, the network for technology professionals. Follow him on Twitter @stuartj1000.

  SEE ALL
ARTICLES
 

Subscribe to Data Insider

Learn the latest news and best practices about data science, big data analytics, artificial intelligence, data security, and more.

Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Advertisers

Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.

Advertise with Us

Our Brands


Privacy Policy Terms & Conditions About Contact Advertise California - Do Not Sell My Information

Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.