Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Microsoft admits to silent security patching

Redmond doesn't report all its fixes, says Microsoft Security Response Center

Article comments

Microsoft doesn't report all security vulnerabilities that it fixes in its software. Bug comparisons between vendors therefore paint an incorrect picture.

"We don't document every issue found," Mike Reavey, director of the Microsoft Security Response Center (MSRC), said at a meeting with reporters at the company's corporate headquarters in Redmond, Washington.

Microsoft will issue a Common Vulnerabilities and Exposures (CVE) number to a vulnerability for flaws that share the same severity, have an attack vector and a workaround. If several flaws share all the same properties, they will not be reported separately, Reavey said.

The nondisclosure of fixes was brought to light early this month by a company called Core Security Technologies. After studying the Microsoft patches MS10-024 and MS10-028, it noticed three silent fixes. Security bulletin MS10-028 addressed a flaw that would expose a user of Microsoft Visio to a buffer overflow attack, which would allow an attacker to take over control of the system.

Microsoft didn't report the additional flaws that it patched in the Visio case because: "The attack vector was exactly the same, the severity was exactly the same. From a customer's perspective, the same workaround - not opening Visio documents from untrusted sources -- applied," Reavey told Webwereld, an IDG affiliate, in an interview after his presentation.

Adobe too is keeping quiet about internal vulnerability fixes. During a presentation at the Microsoft event, Adobe's director of product security and privacy, Brad Arkin, admitted that it won't assign CVE numbers to bugs that the firm found itself. Adobe considers these updates "code improvements," Arkin said. CVE numbers are used only for bugs that are actively exploited or that were reported by external researchers.

Keeping quiet on security updates isn't without consequence. Both vendors and security researchers have used CVE counts to assess the security of different operating systems and applications. At the press event, Microsoft showed a slide comparing the number of security updates that issued for UbuntuLTS, Red Hat Enterprise Linux 4, OS X 10.4 as well as Windows Vista and Windows XP. In a different slide the company compared security updates for SQL Server 2000, SQL Server 2005 and an unnamed competing database.

Reavey admits that these vulnerability count comparisons are flawed, but argues that they still make sense as a basic comparison tool. "There is a lot of different ways that you can measure security. Vulnerability counting is one way, and it is not perfect." Comparing the number of vulnerabilities per line of software code provides another metric. Reavey argues that vulnerability counts are in fact a useful way to compare between products from one vendor.

The Microsoft director downplayed the vulnerability count discussion as "accounting" that mostly distracts researchers from fixing flaws. When one flaw is reported, the firm would prefer to optimize a research tool that surfaces 200 related bugs through fuzzing. Technically, the code may contain 200 vulnerabilities, but "you change one line of code and it blocks all 200 potential fuzzing issues. Is that one vulnerability? Is that 200 vulnerabilities? I don't really know."

"If we spend time to get the accounting correct, that is time that we take away from getting a solution out to protect customers," he said.



Share:

More from Techworld

More relevant IT news

Comments

thomas said: Theres a difference between internal and external documentation MS is certainly documenting issues they identified at least in source control apps but it doesnt mean that they have to publish it right away for everyone to look at

Tommy James said: We dont document every issue found Developers get a rocket for not documenting their work properly You dont have to broadcast every change you make but you have ot documetn it and make it transparent for those who want or need to know



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *