Microsoft: We'll help other vendors find, fix their bugs
But company stops short of promising to lend Windows Update to others
Computerworld - Microsoft Corp.'s security team will help third-party developers of Windows applications and add-ons find and fix bugs in their software, the company said today.
The program, dubbed Microsoft Vulnerability Research (MSVR), is a formalization of things the company currently does, not a brand-new initiative, said Andrew Cushman, the company's director of security response and outreach, from the Black Hat security conference.
"This is work we're already doing," he said. "We'll report vulnerabilities we find in third-party software, and we'll work with them to identify, resolve and mitigate those vulnerabilities."
Microsoft has, at times, gone public with work it has done in collaboration with other software vendors. One of the most recent examples was in May and June, when Microsoft worked with Apple Inc. on flaws in both its own Internet Explorer browser and Apple's Safari. Then, however, Microsoft took shots at its rival, telling users in one of its security advisories that they should stop using Apple's browser until it was fixed.
Earlier this year, Microsoft helped out Yahoo Inc. by issuing a "kill bit" update through its Windows Update service that disabled a buggy ActiveX control installed by Yahoo on PCs that played tunes purchased from its now-defunct online music store.
According to Cushman, Microsoft's security researchers will report bugs they find during their work to third-party developers, and coordinate their work to make sure that details of those vulnerabilities don't go public before a patch is in place. He also said Microsoft would help those third-party companies in other ways, but he was somewhat vague about the extent of that help.
When asked if Microsoft would enhance its Windows Update service so that it pushed third-party updates to Windows users, for example, he hesitated for several seconds before answering: "That's a hard question. We're always looking to provide the best experience for our customers, so we'll examine all aspects, including vulnerability identification, other mitigations and as a final link, detection and deployment.
"But I can't say we would use Windows Update."
Microsoft won't issue security advisories for third-party software as it does for its own programs, said Cushman. Instead, according to a follow-up fact sheet that the company's public relations firm provided, outside vendors will be given "the necessary information and assistance to develop an update to address the vulnerability."
Cushman said the move was in Microsoft's own interests, but he also argued that it would be a win for everyone. "Some may question [our motives], but this is for the good of customers and the enterprise, and it will help protect their environment of Microsoft [software] and other software as well.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- The Shortfall of Network Load Balancing Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Malware and Vulnerabilities White Papers | Webcasts