MS Addressing Google-Exposed Flaw Next Week

Status
Not open for further replies.

hellwig

Distinguished
May 29, 2008
1,743
0
19,860
[citation][nom]Teen Geek[/nom]Microsoft is quick. How long does Apple takes to issue a security patch?[/citation]
There are no security patches because the OS is 100% secure. If your computer is infected, you shouldn't have downloaded that virus/visited that website/inserted that thumbdrive/connected to the internet/plugged in your mac/held it that way.

Duh.
 

hellwig

Distinguished
May 29, 2008
1,743
0
19,860
On another note, I think it was a pretty dick move to release a exploit because Microsoft didn't tell you when a patch was coming out. I'm guessing they didn't know what the problem was to patch it. I'm not sure how releasing the flaw to the public will help the millions of Windows users who could have been affected. I mean, did he at least include his own security solution, or did he Rush-Limbaugh the job and just complain about how someone else was doing it wrong, and not offering any of his own suggestions?
 

dheadley

Distinguished
Mar 31, 2006
171
0
18,680
I think all the businesses or private windows users who were hacked as a result of this guys action should be able to sue him for any damages they suffered as a result of his actions. If what they are saying is true about the short notice then the guy is just a plain asshole and should be treated in kind. Everyone knows they do "patch Tuesdays" and he should have given them the chance to roll out a patch silently before then making public the problem.

People that publish these security holes publicly in order to "force" the companies to do something about it are kind of unrealistic. Being a Google employee you would think he knows this as they often have problems with code themselves that takes a much longer time to get straightened out than he gave MS.

To me it is like someone that finds a problem with the power grid in NYC and causes a blackout to prove their point, then claims that they are not responsible for any looting or crimes or accidents that result from the blackout because they gave the electric utility five days to re-engineer the power stations.
 

adipose

Distinguished
Jan 29, 2010
54
0
18,630
To me it is like someone that finds a problem with the power grid in NYC and causes a blackout to prove their point,

Bad analogy. A better one would be if he published the information on how to cause the blackout.

The end result may be the same, but revealing information is quite different from actually being the attacker.

MS had 5 days to give a timetable for fixing it, but would not do so during that time (I believe he was requesting 30 days). Now that he released it, they fix it in almost no time at all. Sure seems like they could have committed to fixing it in 30 days time.

Those that find security flaws have to have some kind of assurance by the company that the flaw will be fixed, if they are going to cooperate with them. If the company refuses to give that assurance, then why should the security "analyst" play nice?

That said, I don't agree with the action. He could have demanded the 30 day timetable, and if he didn't get it, released on day 30. Instead it seems he got mad and released it the same day when MS wouldn't play ball. Even if MS wouldn't commit to 30 days they might very well have met that goal (as they clearly were capable of).
 

70camaross396

Distinguished
Apr 26, 2010
48
0
18,530
[citation][nom]adipose[/nom]Bad analogy. A better one would be if he published the information on how to cause the blackout.The end result may be the same, but revealing information is quite different from actually being the attacker.MS had 5 days to give a timetable for fixing it, but would not do so during that time (I believe he was requesting 30 days). Now that he released it, they fix it in almost no time at all. Sure seems like they could have committed to fixing it in 30 days time.Those that find security flaws have to have some kind of assurance by the company that the flaw will be fixed, if they are going to cooperate with them. If the company refuses to give that assurance, then why should the security "analyst" play nice?That said, I don't agree with the action. He could have demanded the 30 day timetable, and if he didn't get it, released on day 30. Instead it seems he got mad and released it the same day when MS wouldn't play ball. Even if MS wouldn't commit to 30 days they might very well have met that goal (as they clearly were capable of).[/citation]

I have to agree with you. 30 days is plenty of time to fix the problem or if your not able to fix it at least call the guy back and say hey were working on it, give us a few more days.

To release it after only 5 days makes this guy a asshole. I hate people that qoute comic books but it the old "with great power, come great responcibility" thing. just becuase you can doesnt mean you should. so if this guy is a security researcher at google, then he is a tool.

I would have simply told microsoft about the exploit, given them thirty days to fix it, then release the exploit. hell if they told me they were working on it and it was going to take 60 days, i would have cut them some slack, after all there are millions of lines of code to check. To release this in to the wild after only 5 days is stupid. I think that if your a "security researcher" then you have an obligation to withold the exploit for at least 30 day. personly i think this guy is a tool and should be held accountable for all of the systems that were hacked because he could not wait 30 days.
 

pojih

Distinguished
May 21, 2009
158
0
18,680
Important notice for users of Windows XP with Service Pack 2 (SP2): The support for your product will end July 13, 2010! To ensure that you will receive all important security updates for Windows after that date you need to upgrade to Windows XP with Service Pack 3 (SP3) or later versions such as Windows 7.

Code:
http://support.microsoft.com/ph/1173#tab0

it would appear they have a few days left still
 

f-14

Distinguished
today is the 9th, why 5 days? microsoft policy concerning windows xp this is why:
Important notice for users of Windows XP with Service Pack 2 (SP2): The support for your product will end July 13, 2010! To ensure that you will receive all important security updates for Windows after that date you need to upgrade to Windows XP with Service Pack 3 (SP3) or later versions such as Windows 7.

you guys do know google is keeping track of lots of people machines system specs that use googles products... well maybe google has the scoop that there's just too many people using xp sp2/sp1/1st edition. it seems to me they were trying to be the good guys here and not the a-holy-o's like microsoft wants to be by discontinuing support for an OS that isn't their brand new money maker (and it also has the same security flaw, which will they give their attention to first.) and leave an XP problem until conveintly well after the 13th in a 'richard' move to force people to upgrade to vista or 7 perhaps? that is how marketing works after all.
 

tearlach2

Distinguished
Jan 29, 2010
34
0
18,530
Despite everyone making absurd analogies, this dude released a security flaw he found in windows. how do any conversations he had with MS show anything? I don't think he should have even bothered contacting MS, screw em for making crap.
For real though I am surprised anyone is giving this guy a hard time at all. I feel like I'm in Bizzaro World
 
G

Guest

Guest
If you read between the lines, it sounds more like M$ was blowing off his concerns and not acknowledging the issue. If M$ simply said "Oh snap! Thank you so much for bringing this to our attention! We'll be fixing this issue as soon as possible!", This article would not exist.
 

Kelavarus

Distinguished
Sep 7, 2009
510
0
18,980
[citation][nom]Kunzite[/nom]If you read between the lines, it sounds more like M$ was blowing off his concerns and not acknowledging the issue. If M$ simply said "Oh snap! Thank you so much for bringing this to our attention! We'll be fixing this issue as soon as possible!", This article would not exist.[/citation]

Actually, what I get from reading between the lines is that Microsoft refused to obligate itself to meeting a time line that they weren't 100% sure they could meet, which is perfectly reasonable, then the guy decided be a dick and publicize it because they wouldn't meet his demands.

I haven't seen anything that says they knew exactly how to fix it right then. Knowing how OS (and coding in general) stuff works, it could've been something that could take an hour, or take months. Fortunately for them, it was much less, but they wouldn't have known that right off the bat. Nor would the guy, for that matter, unless he's sitting in front of XP's source code.
 

gurthang

Distinguished
Apr 24, 2009
8
0
18,510
[citation][nom]tearlach2[/nom]Despite everyone making absurd analogies, this dude released a security flaw he found in windows. how do any conversations he had with MS show anything? I don't think he should have even bothered contacting MS, screw em for making crap.For real though I am surprised anyone is giving this guy a hard time at all. I feel like I'm in Bizzaro World[/citation]

Perhaps, it is because all systems and applications have bugs and flaws. And sorry but releasing the exploit to a new not seen the in wild vulunerability helps nobody. Using it in one of those hack to own contests sure but releasing it like he did just comes of as self promotion.
 

gurthang

Distinguished
Apr 24, 2009
8
0
18,510
[citation][nom]f-14[/nom]today is the 9th, why 5 days? microsoft policy concerning windows xp this is why:Important notice for users of Windows XP with Service Pack 2 (SP2): The support for your product will end July 13, 2010! To ensure that you will receive all important security updates for Windows after that date you need to upgrade to Windows XP with Service Pack 3 (SP3) or later versions such as Windows 7.you guys do know google is keeping track of lots of people machines system specs that use googles products... well maybe google has the scoop that there's just too many people using xp sp2/sp1/1st edition. it seems to me they were trying to be the good guys here and not the a-holy-o's like microsoft wants to be by discontinuing support for an OS that isn't their brand new money maker (and it also has the same security flaw, which will they give their attention to first.) and leave an XP problem until conveintly well after the 13th in a 'richard' move to force people to upgrade to vista or 7 perhaps? that is how marketing works after all.[/citation]

You realize just how old XP is and that SP3 is a free service pack don't you and that the cut-off "date" has been known for some time. At some point all developers need to focus their limited resources on the newer systems. Oh and if you have a contract with MS and the deep pockets to afford it you can get them "help" with older systems too just not for free anymore.

Hey MS bashing is easy and sometimes fun when Balmer does something stupid. (Windows Moble *cough*) But really in this one case they are not the bad guys.. slow and bureaucratic maybe but neither evil nor bad.
 

dertechie

Distinguished
Jan 23, 2010
123
0
18,690
[citation][nom]tearlach2[/nom]Despite everyone making absurd analogies, this dude released a security flaw he found in windows. how do any conversations he had with MS show anything? I don't think he should have even bothered contacting MS, screw em for making crap.For real though I am surprised anyone is giving this guy a hard time at all. I feel like I'm in Bizzaro World[/citation]

There's this little thing called responsible disclosure. You tell the vendor, give them a reasonable amount of time. If they fix it, great, you reveal it when the patch comes out. If not, you reveal to pressure them into making a patch. If the exploit wasn't used before revelation (and this one wasn't), no one gets hurt. If it's already being abused, you of course release it to allow for defensive measures. Dropping the exploit into the wild without giving reasonable time to fix it is irresponsible and hurts both about 10,000 hapless users and Microsoft. If he had been waiting for over a month with no response, I wouldn't have an issue with him releasing. Releasing it 5 days after discovery is, bluntly, a dick move.

To the guy saying they want to avoid supporting SP2, SP3 has been out for two years now (and gets security patches until something like 2014). Even the most bureaucratic IT department has had plenty of time to make the upgrade
 

jsm6746

Distinguished
Mar 1, 2010
97
0
18,630
this is like finding out a new way of smuggling a bomb on a plane, letting the plane companies know, then making it public 5 days later. a couple planes blow up and you just set back with a smug 'i told you so'...

you'd call it irresponsible, except that google is a competitor with microsoft... and of course no one would consider 'google' as irresponsible, as they have data mined so much dirt on everyone that such beliefs would only keep you up at night...
 

zaznet

Distinguished
May 10, 2010
387
0
18,780
Next week Microsoft is slated to address a zero-day vulnerability

Zero-Day is referencing how old the exploit is.

After 24 hours the vulnerability is no longer zero-day.
 
Status
Not open for further replies.