IE 7 bug reopens debate over patch responsibilities
Researchers argue over who to blame; Microsoft again denies there's a bug
Computerworld - Security researchers are again arguing over who is responsible -- Microsoft Corp. or third-party developers -- for protocol-handling bugs after a researcher on Friday said Internet Explorer 7 can be used to trick users into launching malware.
Posting to the Full Disclosure mailing list, Juergen Schmidt, a researcher at Heise Security, blamed IE 7 for passing invalid Uniform Resource Identifiers (URI) to Windows XP. Specifically, said Schmidt, IE 7 accepts URLs from other applications that include the "%" [percent] character, which can launch software or scripts on users' machines if they click on a malformed link.
According to Schmidt and others, the earlier IE 6 doesn't have the bug, indicating that something broke between versions. "Post-IE7 has a flaw/threat/vulnerability it hasn't had pre-IE7," said Thierry Zoller, a penetration tester at German security firm n.runs AG.
Windows' URI protocol handling, the technology that lets browsers run other programs via commands in the URL, has been criticized since July, when Norwegian researcher Thor Larholm demonstrated how IE and rival Firefox could be used to run malicious code. Even then, researchers feuded over responsibility. Mozilla Corp. patched Firefox several days later, but Microsoft declined to fix IE, saying that it didn't consider the issue a vulnerability in its software.
Schmidt identified several applications, including Adobe Systems Inc.'s Acrobat Reader, the Netscape browser and Miranda, an IM client, that he said improperly handle URIs with the percent symbol, and he hinted that there were plenty more.
His post drew reaction on Full Disclosure. "The applications are accepting arbitrary input and not validating correctly," said Roger Grimes, a security consultant who said he works at Microsoft. "How is that a Microsoft or Windows problem? How could Microsoft determine ahead of time what is and isn't [a] legitimate character to pass to applications they don't own?"
"How is that _not_ a Windows Problem?" replied Zoller. "It's not that they should decide what to pass or not to pass on, the problem in the example Juergen sent is [that] they pass internally, not to third-party applications."
"If the application is what exposes the URI-handling routine to untrusted code from the Internet, then it's the application's job to make sure that code is trusted before exposing system components to its commands, no?" asked another user who went by the name "Geo."
Microsoft denied responsibility for any vulnerability in July and repeated that to Schmidt after he asked if the company's security center would address the problem. "After its thorough investigation, Microsoft has revealed that this is not a vulnerability in a Microsoft product." The company was not available early Monday to confirm that its previous comment remains its official position.
- Securing Mobile App Data - Comparing Containers and App Wrappers Analysts agree that Mobile Device Management (MDM) is not enough when it comes to securing app data. Although it remains a critical component...
- PCI 3.0 Compliance In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint devices.
- Mitigating Security Risks at the Networks Edge This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
- 5 Strategies for Modern Data Protection Read the five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that...
- Business-driven data protection Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the ARCserve team will...
- On-Demand Webinar: Mind the Gap! Watch the webinar featuring Bob Janssen, CTO and Co-Founder of RES Software, to start building a solid foundation for business and IT to... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!