Microsoft: No Pwn2Own bug in IE9
But 99% of IE users may be at risk until patch appears
Computerworld - Microsoft on Thursday said its Internet Explorer 9 (IE9) does not contain the bug exploited this week by an Irish researcher at the Pwn2Own hacking contest.
But while IE9 is not vulnerable to attacks using the same Pwn2Own exploit, up to 99% of IE's users may be at risk.
Shortly after Pwn2Own organizer Aaron Portnoy announced Fewer's success, Microsoft said it had the vulnerabilities in hand and had started investigating.
IE9, however, will not need a patch.
"The vulnerability was addressed in the RC [release candidate] and RTM [release to the Web] versions of Internet Explorer 9," said Jerry Bryant, a group manager with the Microsoft Security Response Center, in an e-mail reply to questions. "This update is already in the pipe for down level-versions of Internet Explorer."
"Down-level" refers to older editions of IE, such as IE8.
Microsoft launched IE9 RC a month ago, and plans to make IE9 RTW -- the browser's final code -- available for download on Monday, March 14, at 9 a.m. PT.
But because IE9 has such a small share of the browser market -- less than six-tenths of 1% -- the overwhelming majority of IE users will have to wait for a patch aimed at the older versions.
According to the latest statistics from Web metrics company Net Applications, IE6, IE7 and IE8 make up 99% of all versions of Internet Explorer in use.
Although Bryant said that a fix is "already in the pipe," Microsoft declined to specify a patching timetable. If Microsoft keeps to its usual practice of updating IE only on even-numbered months, the first opportunity would be April 12, that month's Patch Tuesday.
Microsoft is typically reticent to push out emergency, or "out-of-band" updates unless attacks are ongoing, and then only when the volume of those attacks spikes.
Last year, Microsoft took three months to address the vulnerability used to hack IE at Pwn2Own, matching its patching speed of 2009 but lagging behind both Mozilla and Apple, whose browsers also fell to researchers' exploits in the March 2010 contest.
Microsoft may see little need for speed, since the bugs exploited at Pwn2Own are handed to TippingPoint's Zero Day Initiative (ZDI) bug bounty program, which requires researchers to keep quiet about the vulnerabilities and their exploits. ZDI turns bugs over to vendors, who have six months to fix the flaws before TippingPoint goes public with any information.
Earlier this week, for example, Bryant downplayed the need to patch IE before Pwn2Own started, noting that with TippingPoint's practices, there was no danger of a vulnerability escaping into the wild. "Pwn2Own bugs are reported to vendors in a coordinated way," Bryant said on Tuesday.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is email@example.com.
- iPhone, BlackBerry tumble to Pwn2Own hackers
- Researcher chains three exploits to take down IE8 at Pwn2Own
- Safari, IE hacked first at Pwn2Own
- Researcher blows $15K by reporting bug to Google
- Microsoft won't patch IE before Pwn2Own
- Apple to patch Safari before Pwn2Own, say researchers
- Mozilla follows Google, patches Firefox as prep for Pwn2Own
- Three-time Pwn2Own winner knocks hacking contest rules
- Familiar faces, new names step up at Pwn2Own hacking contest
- Update: Firefox update will patch CSRF bug, Mozilla says
Read more about Security in Computerworld's Security Topic Center.
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Data Protection eGuide In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly...
- Warning: Cloud Data at Risk Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the...
- The Opportunities and Challenges of the Cloud In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Live Webcast IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!