Microsoft admits it knew of critical IE bug in early '08
Lengthy time gap 'not acceptable,' says analyst; workaround update set for Tuesday
Computerworld - Microsoft on Thursday confirmed it has known about a bug behind widespread Internet Explorer (IE) attacks for more than a year, but defended its security process against critics.
According to Mike Reavey, director of Microsoft's Security Response Center (MSRC), the company first got word of a critical flaw in an ActiveX control in early spring 2008. The bug can be exploited through IE6 and IE7 on Windows XP. Two researchers, Ryan Smith and Alex Wheeler, reported the bug to Microsoft when they worked together at IBM's ISS X-Force in 2007. Smith is now a vulnerability researcher at VeriSign iDefense, while Wheeler manages 3Com's TippingPoint DVLabs.
Although both Smith and Wheeler have declined to say when they reported to vulnerability, the bug's CVE (Common Vulnerabilities and Exposures) number pointed to an early 2008 reporting date.
The 16- to 18-month stretch between early 2008 and now is too long for Microsoft's customers to go without a patch, said John Pescatore, Gartner's primary security analyst. "That's just not an acceptable timeframe," Pescatore said. "It shouldn't take a year, not [for] a company the size of Microsoft.
"It's really hard to think of some technical reason why it would take 18 months. That means it must be for other reasons, business reasons or product reasons or priority reasons," he said. "But this had to have been pretty high-priority."
"We kicked off our investigation as soon as the vulnerability was reported to us," countered Reavey. "When a vulnerability is reported, we not only look at that, but also investigate other issues around it to provide as much protection as possible."
The 16- to 18-month time span, however, is certainly above average, Reavey agreed. "The timeline is not the norm," he said. "The vast majority of vulnerabilities are patched before there's ever an attack."
What, then, took so long?
Although Reavey declined to get specific today, Smith, one of the researchers who reported the vulnerability, hinted at reasons. "The nature of this flaw is sort of unique," he said. "The mechanics of this are sort of unique as well. It was those unique qualities that required more time than Microsoft would normally need."
Smith refused to criticize Microsoft for not patching sooner. "All along the way, they've told me how far things have progressed," he said of Microsoft's security team. "They would ping me every time they reached a milestone on the fix."
Even so, he admitted that patching quickly is better than fixing slowly. "As a security researcher, you always want to see a patch the day after you report a bug," Smith said.
In fact, Microsoft has not yet wrapped up work on a fix, Reavey acknowledged. "We'll release something that will block all known attacks next week," he said, referring to Tuesday, July 14, when Microsoft rolls out its monthly security updates. But it won't be a full-fledged patch.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!