Google researcher gives Microsoft 5 days to fix XP zero-day bug
"Google can't have its cake and eat it, too," said Robert Hansen, the CEO of SecTheory. A noted security researcher -- in 2008, he and Jeremiah Grossman, chief technology officer at WhiteHat Security, made headlines when they revealed details about browser "clickjacking" attacks -- Hansen scolded Google, Ormandy's employer, for claiming that the company abides by responsible disclosure when its security researchers do not.
"Their researchers are going off half-cocked," said Hansen, who deplored Ormandy's quick publication of the vulnerability and attack code. "It just doesn't add up."
Hansen went even further, and said a case could be made that Ormandy's fast trigger could be part of the battles between Google and Microsoft. "It sounds to me like Google was upset about the publicity over its decision to drop Windows, the 'use anything but Microsoft' thing. Google got a lot of backlash from the security community over that, because it doesn't matter what OS you use."
"This stinks of retribution," said Hansen. "If Google really goes by responsible disclosure, they should fire Ormandy today." Hansen noted that Ormandy credited other Google security researchers for their help and linked to a Google blog on browser security in his message on Full Disclosure. "You shouldn't do that if you want to disassociate yourself from your employer."
That's impossible, argued Andrew Storms, director of security operations at nCircle Security. "[As a security researcher] you can't really separate your work from your employer. So you have to wonder if [Ormandy isn't intentionally feeding the feud between Google and Microsoft."
Like Hansen, Storms questioned Ormandy's decision to reveal his findings just five days after he reported the vulnerability to Microsoft. "You can't say in this case that the vendor was sitting on their hands, not being responsive, which is why researchers usually go public, to force [a vendor's] hand.
"This is no better than not reporting it to Microsoft," concluded Storms.
Hansen, who acknowledged that he has worked for Microsoft as a security consultant on several projects, weighed in again. "The whole thing rubbed me the wrong way," he said.
Ormandy did not respond to a request for comment on Hansen's accusations.
Others knocked Ormandy for offering up an unsanctioned fix. In his note on Full Disclosure, Ormandy recommended moves that users could take until a patch is ready, including a link to what he described as an "unofficial (temporary) hotfix."
But Secunia said the patch didn't work. "It is possible to bypass the fix implemented by the unofficial hotfix and still exploit the vulnerability," claimed the Danish vulnerability tracking firm in a blog post Thursday.
Microsoft agreed with Secunia. "The mitigations [Ormandy] presented may not be effective, so he has really put both our customers and the customers of his employer at risk," said the MSRC's Bryant.
Microsoft's next regularly-scheduled security updates will ship July 13. Storms, for one, doesn't think Microsoft will have a fix finished by then. "They probably already have all the patches for July in QA by now," said Storms. "I don't think it's feasible that they could have something ready in time."
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
- Researcher claims two hacker gangs exploiting unpatched IE bug
- Update: Third of Internet Explorer users at risk from attacks
- Microsoft plans another short patch slate for next week, but finds a few XP bugs to crush
- Target attack shows danger of remotely accessible HVAC systems
- Target hackers try new ways to use stolen card data
- Update: Microsoft to patch just-revealed Windows zero-day tomorrow
- NSA spying prompts open TrueCrypt encryption software audit to go viral
- Microsoft warns of Office zero-day, active hacker exploits
- Hackers move to create next Blackhole after 'Paunch' arrest
- Adobe hack shows subscription software vendors lucrative targets
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts