Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Microsoft Admits to Hiding Flaw Details 147

Spongeform writes "eWeek has an interview with a Microsoft security official admitting to hiding details on software vulnerabilities that are discovered internally. The reason? Microsoft believes that full disclosure of every security-related product change only serves to aid attackers. However, companies using host-based IPS that rely on flaw information to build signatures are basically left at risk because of Microsoft's silent fixes."
This discussion has been archived. No new comments can be posted.

Microsoft Admits to Hiding Flaw Details

Comments Filter:
  • Anyone remember the (deeply flawed) Cert statistics [tectonic.co.za] where Microsoft had 812 vulnerabilities compared to Unix + Linux's 2328?

    Well, here's another reason why that report was flawed - it turns out that Microsoft are fixing multiple vulns in one advisory - from the article:
    Manzuik said Microsoft has been silently fixing bugs as far back as 2004. He referred to the company's MS04-007 [microsoft.com] bulletin as a classic example of Microsoft announcing a fix for a single vulnerability when in fact a total of seven flaws were quietly fixed.
    Of course, Microsoft is going to argue that they fix vulns silently to prevent the 'bad guys' from using the patch info to create attacks, but this is refuted by the same researcher:
    "I don't buy the argument that they are aiding attackers. The attackers are already reverse-engineering the patches. They have the time and resources to find out where the flaw lies. The guy that feels the pain is the system administrator who is in the dark and who can't do his own reverse-engineering,"
  • Obfuscandalous! (Score:5, Insightful)

    by eldavojohn ( 898314 ) * <eldavojohn@noSpAM.gmail.com> on Thursday April 20, 2006 @07:59AM (#15163734) Journal
    I seem to remember being told in my software engineering class of a type of protection that provides a false sense of security [newsforge.com]. I think that Microsoft may be becoming more and more guilty of it [wikipedia.org].

    Perhaps it's time they should change their "Who would ever think to put those bytes there anyways?" mantra.
  • by Anonymous Coward on Thursday April 20, 2006 @08:03AM (#15163753)
    Relying on software developed and maintained by someone else always leaves you vulnerable to changes they make.

    This isn't exactly limited to Microsoft.
  • by MobileTatsu-NJG ( 946591 ) on Thursday April 20, 2006 @08:09AM (#15163767)
    "Of course, Microsoft is going to argue that they fix vulns silently to prevent the 'bad guys' from using the patch info to create attacks, but this is refuted by the same researcher:"

    I'm not really sure how the statement you posted really refutes it. He's right under the assumption that the attackers are aware of that particular flaw existing. But if Microsoft (or a good samartian) finds it first, then why wouldn't staying mum mean less risk of attack? We can metaphor joust about it, but I wouldn't say the argument is totally hot air.

    Don't confuse this post as support of MS's practices here. I don't agree with it. If I know an exploit is out there, even though I don't have the skills to build my own patch, I can at least take other steps to minimize or even prevent damage from happening. I just don't entirely blame Microsoft for advertising to the world the exact details of how to be a total butthead on the internet.
  • Re:Obfuscandalous! (Score:4, Insightful)

    by antifoidulus ( 807088 ) on Thursday April 20, 2006 @08:09AM (#15163768) Homepage Journal
    It is insecure and it isn't....Security through obscurity if you want to put it like that does do one thing: it buys time for them to create a fix. If they came out right away and told people about the holes then they would be in an even more intense race against attackers.
    I'm not defending their practice(this is /. after all :P) but saying "it is totally worthless" is a bit well..disengenious.
  • Customers? (Score:4, Insightful)

    by farker haiku ( 883529 ) on Thursday April 20, 2006 @08:11AM (#15163774) Journal
    FTA: "We want to make sure we don't give attackers any [additional] information that could be used against our customers.

    But, if they are your customers, they can get the patches no problem right? So really this policy only helps out the pirates. Right?
  • Why should Microsoft tell people about security flaws which are not known about in the public domain? It makes sense to fix them, issue a patch, and then make a statement.

    If you had read the article rather than rushing to get first post, you would know that they're talking about releasing information about flaws after the patch is released.

    If you still don't understand why they should release information, consider the following from the article:
    "Microsoft's customers depend on that information to figure out how to respond to Patch Tuesday. The reality is, system administrators will delay deploying a patch based on the details of the bulletin. When details aren't included, he won't install that patch"
  • by briansmith ( 316996 ) on Thursday April 20, 2006 @08:14AM (#15163792) Homepage
    Can there truly be a flawless operating system?
    Is it possible to design an easy to use, accessible, and reliable application that has no security holes?
    I think not, but if you could, you may become richer than Gates himself.


    The reason you wouldn't become richer than Gates if you did this is that it would be incredibly expensive to develop such a system. You would also have a long time-to-market. The result would be a very reliable operating system that is late to market and incredibly expensive. Your would-be customers would then choose your cheaper competitors that have more modern features that they have come to expect. These features would be ones that were invented during the huge period of time that your operating system is going through its rigorous design, implementation, and verification process.

    Even coming up with a workable definition of a "flawless operating system" and stating exactly what criteria is used to certify the product as "easy to use, accessible, and reliable" would takes a lot of time and money.
  • "Of course, Microsoft is going to argue that they fix vulns silently to prevent the 'bad guys' from using the patch info to create attacks, but this is refuted by the same researcher:"
    I'm not really sure how the statement you posted really refutes it.

    Perhaps I should be clearer. My quote included The attackers are already reverse-engineering the patches.

    All the attacker needs is the patch - they can look at that to see whats changed and where & deduce from that where to start looking for attack vectors. It's not particularly a big help for them to hear "Function blah in program blah has changed"

    System Administrators on the other hand do not have time to reverse engineer the patch, but can read the summary and say "we don't use function blah in program blah, lets apply the patch as it won't affect our operations" or "Holy shit, we have program blah exposed to a hostile network, lets quickly test our stuff & rush the patch out"

    So what Microsoft is actively hampering administrators and not hindering attackers.
  • Re:scandal! (Score:3, Insightful)

    by Whiney Mac Fanboy ( 963289 ) * <whineymacfanboy@gmail.com> on Thursday April 20, 2006 @08:28AM (#15163849) Homepage Journal
    Doesn't SLASH have a similar policy?

    If you had read the article rather than rushing to point out slashdot's supposed hypocrisy, you would know that they're talking about releasing information about flaws after the patch is released.

    Nothing to with responsible disclosure at all.
  • by sbaker ( 47485 ) * on Thursday April 20, 2006 @08:31AM (#15163860) Homepage
    But didn't I read someplace that Microsoft were coming out with their own anti-virus/anti-whatever suite with a monthly service charge?

    With that in mind - why would they tell other, competing, anti-virus companies what flaws to protect against?

    Come to think of it - why bother fixing flaws at all - just defend against them in the MS Anti-virus gadget instead and encourage people to pay the anti-virus tax. It might even be tempting to add the occasional flaw just to make that work better.

    I don't know whether any of these things will actually happen - but you simply can't trust the motives of a company that behaves the way MS consistently does.
  • by Inoshiro ( 71693 ) on Thursday April 20, 2006 @08:34AM (#15163871) Homepage
    RFPolicy is a solid policy for allowing a vendor to be notified in a timely manner (5 days), let them work with the reporter to get a plan of action together (such as a quick way to notify customers and let them get the fix rolled out) and help the vendor reproduce the bug/verify the fix, before notification of the general populace.

    If, at any point, the vendor suddenly decides to play not-nice, the RFPolicy is quite clear -- go ahead and post it to bugtraq or whatever you like. It also states that the vendor should acknowledge the original disclosure. That is, if I found a vulnerability in slashcode, but delayed publication because I was trying to get it fixed in good faith, the Slashcode developers would acknowledge my efforts in their advisory -- even if someone else comes along and posts an advisory after I report it to the team, but before the team has posted an announcement.

    Nowhere in the RFPolicy v2.0 [wiretrip.net] does it say anything along the lines of, "Hey, you should silently slip-stream fixes without ever notifying anyone ever " -- which is what this article is about Microsoft doing.

    The shit that gets modded up. I swear, we need a "-1 WRONG" tag we can apply to posts. Some kind of clue stick for the mods that don't bother to look up RFPolicy would also be good.
  • by Anonymous Coward on Thursday April 20, 2006 @08:46AM (#15163934)
    This approach might help Microsoft avoid some embarrassment, under the plausible excuse of not helping hackers, but what about businesses that don't automatically apply every update that comes out? I worked for a manufacturing plant that carefully evaluated each vulnerability and weighed the security risk it posed against the risk that an update might break something.

    This is VERY important for the customer, which Microsoft has shown repeatedly not to give a rat's ass about. So, no surprise here. The best defense for the customer is to just assume MS is evil, and act accordingly.
  • by drsmithy ( 35869 ) <drsmithy@nOSPAm.gmail.com> on Thursday April 20, 2006 @08:53AM (#15163970)
    But didn't I read someplace that Microsoft were coming out with their own anti-virus/anti-whatever suite with a monthly service charge?

    The purpose of "anti-malware" tools is *not* to protect against software flaws, it's to protect against user mistakes. A rather large proportion of people on Slashdot seem to have a great deal of difficult understanding this.

    No amount of OS "security" can stop the end user from shooting themselves in the foot. The purpose of "anti-malware" software is to give them a chance to dodge the bullet.

  • by Opportunist ( 166417 ) on Thursday April 20, 2006 @09:15AM (#15164090)
    That's the crucial problem in this policy. People, especially people who're wary when it comes to MS "patches" or those who have to watch their bandwidth (unless they want to pay extra for more traffic) will read patchnotes carefully, then ponder what the patch does according to the info given and more often than not (especially when the patch is supposedly for a feature they don't use) they'll simply say "Don't need it. Doesn't apply to me."

    This patch might have fixed a key security hole. But if you don't know it, how should you decide whether you should apply it? I don't buy the story that MS knows what's good for me. If anyone knows, I do. And I certainly won't hand this decision over to someone else.
  • by OwlWhacker ( 758974 ) on Thursday April 20, 2006 @09:21AM (#15164133) Journal
    If I were a system administrator, I'd be applying every patch they handed me, on the off chance it's patching an obscure vulnerability I'd never catch in a million years.

    If you apply a Microsoft patch for something that is never likely to affect you, you're taking a bigger risk by applying the patch!

    Most people here should be aware that applying a Microsoft patch is likely to screw something up -- something Microsoft has become renowned for.
  • A) Who in the tech world didn't aleady know this?

    The news is that microsoft are admitting it. The security community have 'stronly suspected' this for years.

    B) Do you realize even *nix vendors do this, including Linux distributions?

    Could you please provide an example of this (for linux vendors)?

    Of course - even if you do find an example (I doubt it), it doesn't change the fact that its just the distribution - the upstream developers will have released patch information, etc. There is no parallel for this sort of openess in the windows world.

    C) Do you also realize that Apple patches more items in a single Patch on average compared to MS by a factor of 10 or more?

    I do realise Apple patches multiple vulns in one go. Fortunately however, anything remotely important that is distributed by Apple is written by third parties with more responsible discolure policies (ie openbsd, the apache foundation).

    You make a good point about granularity of "bug counting" lists. There's a lot of room for improvement.
  • FUD! (Score:5, Insightful)

    by OwlWhacker ( 758974 ) on Thursday April 20, 2006 @09:41AM (#15164290) Journal
    Anyone remember the (deeply flawed) Cert statistics where Microsoft had 812 vulnerabilities compared to Unix + Linux's 2328?

    Indeed.

    What makes it worse is that Microsoft knows full well that this data is false, and still uses this in its FUD attacks against Linux/Open Source.

    Even if Microsoft persuades people that it has a good reason for not disclosing vulnerabilities, Microsoft has no good reason to use false statistics, created by its hiding of information, in order to help persuade people that its software is more secure.

  • by makomk ( 752139 ) on Thursday April 20, 2006 @10:08AM (#15164511) Journal
    This got moderated Insightful?

    That would be an insightful comment... in fantasy land. Most Windows system administrators are not programmers, and of those that are fewer still are technically skilled enough to reverse engineer a binary patch.

    Exactly - so how are they meant to know what it does? On the other hand, at least some of the bad guys can and will reverse-engineer to the patches. (Some security researchers are able to too, hence why this came out, but they probably don't have the time to do it for every single patch.)



    Microsoft has a valid point when they say that publishing vulnerabilities mainly helps out 'bad guys' because the majority of their 'good guy' users don't have the skills to counterattack. It's not like the open-source world, where there's a large community of skilled programmers ready and willing to publish fixes... and, more importantly, outnumber skill-wise any malicious programmers.

    We're talking about vulnerabilities for which Microsoft has already released a patch - all the sysadmins need to know is that it exists and they need to apply it. The fact that Microsoft is providing incomplete information about what its patches fix means that some systems might not get patched because the administrators think it doesn't apply to them and don't want to risk breaking stuff by applying it.
  • Re:Obfuscandalous! (Score:3, Insightful)

    by Zeinfeld ( 263942 ) on Thursday April 20, 2006 @10:11AM (#15164532) Homepage
    It is insecure and it isn't....Security through obscurity if you want to put it like that does do one thing: it buys time for them to create a fix. If they came out right away and told people about the holes then they would be in an even more intense race against attackers.

    The point is that relying on security through obscurity alone is a bad strategy. The ideal is to be able to publish the entire architecture and the system would still be safe. No system in existence meets the ideal.

    Full disclosure is bunk, there are large numbers of evil hackers on BUGTRAQ. Exploit code is often published there for the sole purpose of covering the tracks of an attacker.

  • If I have two binaries, I can compare them. I have tools that can walk the function entries and traverse code. If I find a function binary difference, I can scrutinize it to try to determine what has been "fixed".

    Now, I *am* an experienced developer. When I do initial probes on "black box" binaries, I actually prefer to NOT have source available (as I am interested in what it is doing, not the comments or source that the original programmer put down indicating what it was intended to do).

    Administrators? Generally can't do it. If I WERE a "black-hat", I would be all over the actual patches. I don't care about the paper reports.

    The paper reports are critical to the administrators. They are not looking for a crack -- they have to trust that the changes have been checked and the work done carefully to avoid additional problems. But the only way the administrator has to determine if a patch should be applied, and what the risk is, is by full vendor disclosure. The "black-hats" don't really care that much. Of course, full disclosure can be a public relations nightmare.

    The advantage that "open source" has here is that the laundry is already out in the open. Reputation can be (perhaps) slightly reduced by exploits, but it (again generally) doesn't destroy the product.

    As an example, many people (including me) use sendmail and bind.

    However, a closed source provider typically stakes a marketing created reputation. Exploits can really hurt. Take Windows 9x as an example. About the only thing Microsoft can do is state that future Windows are more secure. (even though Windows 98 as a core is reasonably hardened, as long as trojans are not executed, which it is VERY vulnerable to).

    Oh, and "good guys" don't "counterattack". Just because someone attacks sshd on my box doesn't mean I turn around and attack. Generally, I ignore it. A "counterattack" stops at reporting the attempts to an upstream provider if they are very persistent (or successful).
  • Perhaps, but do you really think microsoft tests every possible patch configuration? I'd bet they only test the last service pack plus the patch and maybe current with all updates. You're taking a risk running a "non standard" environment too. Besides, you should always patch a few systems that seem common to your environment before rolling out patches in a large corporate environment anyway.
  • by stanmann ( 602645 ) on Thursday April 20, 2006 @12:03PM (#15165475) Journal
    The big difference is a patch for Oracle 9.0.7, isn't going to change the functionality of your email client. Just as a patch for a Cisco 9320, isn't going to change how your flatbed scanner works. A MS Word patch could change how your email client works, or how your flatbed scanner works.
  • by OwlWhacker ( 758974 ) on Thursday April 20, 2006 @12:09PM (#15165523) Journal
    do you really think microsoft tests every possible patch configuration?

    No.

    You're taking a risk running a "non standard" environment too.

    I am?

    Besides, you should always patch a few systems that seem common to your environment before rolling out patches in a large corporate environment anyway.

    Indeed. You should test the patches first; however, if there is a vulnerability that you really must patch, and it's going to knock out something you're dependent on, either way you lose.

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...