Skip the navigation

Microsoft security guru wants Vista bugs rated less serious

But 'an exploit is an exploit,' says one researcher

March 16, 2007 12:00 PM ET

Computerworld - Microsoft's own bug hunters should cut Windows Vista some slack and rate its vulnerabilities differently because of the operating system's new, baked-in defenses, according to the developer who is often the public persona of the company's Security Development Lifecycle (SDL) process.

Michael Howard, a senior security program manager in Microsoft's security engineering group, said that the Microsoft Security Response Center (MSRC) is being too conservative in its Vista vulnerability rating plans. Because Vista includes security techniques and technologies that Windows XP lacks, the MSRC should reconsider how it ranks Vista when a vulnerability affects both Microsoft's new operating system and its predecessor, Windows XP, he said.

"The MSRC folks are, understandably, very conservative and would rather err on the side of people deploying updates rather than trying to downgrade bug severity," said Howard on his personal blog last week. "Don't be surprised if you see a bug that's, say, Important on Windows XP and Important on Windows Vista, even if Windows Vista has a few more defenses and mitigations in place."

The operating system, released to consumers in late January, includes a number of new security features that randomize memory, check code for buffer overflows and require user permission for potentially risky operations.

Not surprisingly, the MSRC rejects Howard's argument. "Windows Vista will not be treated any differently, and severity ratings for any issues will be based on vulnerability traits and merits, along with technical mitigating factors," an MSRC spokesperson said. "This process is the same for all Microsoft products."

Although the MSRC's security bulletins may qualify a bug's severity in some specific environments, its rating system is clear-cut. If an Internet worm can spread without user action -- the MSRC's definition of "critical" -- on Vista, the vulnerability will be so tagged, Vista-specific security technologies notwithstanding.

Analysts and outside Microsoft security professionals took the MSRC's side -- and blasted Howard's idea.

"A remote-code execution exploit still remains a remote-code execution exploit," said Johannes Ullrich, chief research officer at the SANS Institute.

"[Windows] either has the vulnerability or it doesn't," said Marc Maiffret, eEye Digital Security's CTO. "Vista has some additional Band-Aids, but most of those Band-Aids are broken. Hopefully, [Microsoft] isn't so careless that they'll downgrade Vista vulnerabilities."

Other researchers and analysts gave Vista more credit for its beefed-up security than did Maiffret, but most noted that just because Vista has new security features doesn't necessarily mean they'll be used. "They may or may not be turned on," said John Pescatore, an analyst at Gartner Inc. "And users can be tricked, and attackers can get around defenses. I definitely don't think Microsoft should change things."



Our Commenting Policies
Internet of Things: Get the latest!
Internet of Things

Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!