Microsoft puts Mac users at risk with patch policy, says researcher
PowerPoint patch delay runs counter to 'responsible disclosure' practice
Computerworld - A security researcher has called foul on Microsoft for doing exactly what it has thrashed hackers over for years: revealing information that can be used to hijack computers before a patch is available.
Swa Frantzen, one of the analysts at SANS Institute's Internet Storm Center (ISC) criticized Microsoft for issuing patches yesterday that fix the Windows versions of PowerPoint while announcing that patches for the same flaws in the Mac editions would not be released until June.
"Microsoft is the one big company screaming loudest over 'responsible disclosure,'" said Frantzen in a post to the ISC blog late Tuesday. Responsible disclosure, a practice Microsoft has aggressively pushed, demands that researchers delay any disclosure until the bug has been patched. "They want an unlimited amount of time to release their patches before those who found the problem are allowed to publish," said Frantzen. "[But the] policy cuts both ways: You need to obey the rules yourself just as well as demand it from all others involved."
Microsoft, claimed Frantzen, broke its own rules of responsible disclosure yesterday by revealing that Office for Mac 2004 and Office for Mac 2008 contain three unpatched vulnerabilities, and by releasing information about the same bugs in Windows. The combination, he said, could be used by hackers to craft exploits targeting Macs.
"We all know from past experience [that] the reverse engineering of patches back into exploits starts at the time -- if not before -- the patches are released," said Frantzen. ",So in the end, Microsoft just released what hackers need to attack."
An online poll that Frantzen posted on the ISC site showed that 47% agreed Microsoft had been irresponsible in omitting patches for the Mac, while about 24% thought Microsoft made the best-possible decision.
John Pescatore, an analyst for Gartner who covers security, agreed with the minority. "I think Microsoft did the right thing here," he said in an e-mail. "I would much rather see solid, well-tested patches for the highest risk vulnerabilities -- which means first the ones where there are active exploits out -- come out first, rather than wait for all versions to be patched simultaneously, or to rush out immature patches quickly and require re-patching later."
Andrew Storms, director of security operations at nCircle Network Security, took a middle path. "I wouldn't say that [Frantzen] has gone too far. Microsoft really owns 'responsible disclosure,' both in the PR sense and in the sense that they've been able to get researchers to do it," said Storms. "You don't break your own mantra.
"Regardless, I disagree with him," Storms continued, "simply because the proof-of-concept code has been out there for a month." If no one has taken that sample code, and used it to investigate, then create a working exploit for the Mac in the past month and more, Storms argued, it was very unlikely that they would go to the additional work of reverse engineering the Windows patches to figure out how to build an exploit for the Mac.
"Why would they take the harder path," Storms asked, "when they haven't taken the easier?"
Microsoft was not able to immediately provide someone from its security response center to argue the company's side of the responsible disclosure debate, but yesterday it explained the decision to release PowerPoint patches for Windows but not for Mac OS X.
"None of the [PowerPoint] exploit samples we have analyzed will reliably exploit the Mac version, so we didn't want to hold the Windows security update while we wait for Mac packages," said Jonathan Ness, an engineer with the Microsoft Security Response Center, in a post to a company blog.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts