IE 7 bug reopens debate over patch responsibilities
Researchers argue over who to blame; Microsoft again denies there's a bug
Computerworld - Security researchers are again arguing over who is responsible -- Microsoft Corp. or third-party developers -- for protocol-handling bugs after a researcher on Friday said Internet Explorer 7 can be used to trick users into launching malware.
Posting to the Full Disclosure mailing list, Juergen Schmidt, a researcher at Heise Security, blamed IE 7 for passing invalid Uniform Resource Identifiers (URI) to Windows XP. Specifically, said Schmidt, IE 7 accepts URLs from other applications that include the "%" [percent] character, which can launch software or scripts on users' machines if they click on a malformed link.
According to Schmidt and others, the earlier IE 6 doesn't have the bug, indicating that something broke between versions. "Post-IE7 has a flaw/threat/vulnerability it hasn't had pre-IE7," said Thierry Zoller, a penetration tester at German security firm n.runs AG.
Windows' URI protocol handling, the technology that lets browsers run other programs via commands in the URL, has been criticized since July, when Norwegian researcher Thor Larholm demonstrated how IE and rival Firefox could be used to run malicious code. Even then, researchers feuded over responsibility. Mozilla Corp. patched Firefox several days later, but Microsoft declined to fix IE, saying that it didn't consider the issue a vulnerability in its software.
Schmidt identified several applications, including Adobe Systems Inc.'s Acrobat Reader, the Netscape browser and Miranda, an IM client, that he said improperly handle URIs with the percent symbol, and he hinted that there were plenty more.
His post drew reaction on Full Disclosure. "The applications are accepting arbitrary input and not validating correctly," said Roger Grimes, a security consultant who said he works at Microsoft. "How is that a Microsoft or Windows problem? How could Microsoft determine ahead of time what is and isn't [a] legitimate character to pass to applications they don't own?"
"How is that _not_ a Windows Problem?" replied Zoller. "It's not that they should decide what to pass or not to pass on, the problem in the example Juergen sent is [that] they pass internally, not to third-party applications."
"If the application is what exposes the URI-handling routine to untrusted code from the Internet, then it's the application's job to make sure that code is trusted before exposing system components to its commands, no?" asked another user who went by the name "Geo."
Microsoft denied responsibility for any vulnerability in July and repeated that to Schmidt after he asked if the company's security center would address the problem. "After its thorough investigation, Microsoft has revealed that this is not a vulnerability in a Microsoft product." The company was not available early Monday to confirm that its previous comment remains its official position.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!