Jump to content

Google and MicroSoft butt heads again over disclosing seccurity vulnerability

zMeul

source: https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html

 

Quote

After 7 days, per our published policy for actively exploited critical vulnerabilities, we are today disclosing the existence of a remaining critical vulnerability in Windows for which no advisory or fix has yet been released. This vulnerability is particularly serious because we know it is being actively exploited.


The Windows vulnerability is a local privilege escalation in the Windows kernel that can be used as a security sandbox escape. It can be triggered via the win32k.sys system call NtSetWindowLongPtr() for the index GWLP_ID on a window handle with GWL_STYLE set to WS_CHILD. Chrome's sandbox blocks win32k.sys system calls using the Win32k lockdown mitigation on Windows 10, which prevents exploitation of this sandbox escape vulnerability.

 

on October 21st, Google contacted MicroSoft over a known and actively exploited Windows vulnerability - they asked them to either acknowledge it or fix it, MicroSoft did neither

so, Google made the existence of the vulnerability public, MicroSoft isn't happy and they're crying foul - this is not the 1st time Google discovered critical vulnerabilities in Windows and made them public after MicroSoft failed to acknowledge and/or fix them

MicroSoft defense is that vulnerabilities should not be disclosed [personally, I believe it's bullshit even more so when the vulnerability is actively exploited]; and 10 days is not enough time to issue a fix

 

thing is, Google notified Adobe over a Flash vulnerability same day as they did with MicroSoft - Adobe fixed their issue on October 26th: https://helpx.adobe.com/security/products/flash-player/apsb16-36.html

Link to comment
Share on other sites

Link to post
Share on other sites

Security by obscurity is a shit way to do security and has been proven in the past to not work. If a vulnerability exists, hackers will find it, before or after a researcher finds it and properly discloses to the parent company.

 

Seriously, Microsoft has to get its shit together and issue a patch ASAP.

Ensure a job for life: https://github.com/Droogans/unmaintainable-code

Actual comment I found in legacy code: // WARNING! SQL injection here!

Link to comment
Share on other sites

Link to post
Share on other sites

What's funny is there was another article about how Google hid a vulnerability in Apple products for several months to give Apple enough time to fix it.

Current Network Layout:

Current Build Log/PC:

Prior Build Log/PC:

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Lurick said:

What's funny is there was another article about how Google hid a vulnerability in Apple products for several months to give Apple enough time to fix it.

if Apple acknowledged it and asked for time, why not?!

but from what Google tells, MS did neither

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, Lurick said:

What's funny is there was another article about how Google hid a vulnerability in Apple products for several months to give Apple enough time to fix it.

source? if true would be an interesting dynamic

Link to comment
Share on other sites

Link to post
Share on other sites

There's a difference of course between a potential vulnerability and one that's actively exploited.  In the latter case, the dev should drop everything else and sort out the vulnerability first. 

10 days is plenty of time if you throw enough resources at the problem.

Link to comment
Share on other sites

Link to post
Share on other sites

This again. But they could act differently and yeah kinda put more effort into it to release fix sooner.

| Ryzen 7 7800X3D | AM5 B650 Aorus Elite AX | G.Skill Trident Z5 Neo RGB DDR5 32GB 6000MHz C30 | Sapphire PULSE Radeon RX 7900 XTX | Samsung 990 PRO 1TB with heatsink | Arctic Liquid Freezer II 360 | Seasonic Focus GX-850 | Lian Li Lanccool III | Mousepad: Skypad 3.0 XL / Zowie GTF-X | Mouse: Zowie S1-C | Keyboard: Ducky One 3 TKL (Cherry MX-Speed-Silver)Beyerdynamic MMX 300 (2nd Gen) | Acer XV272U | OS: Windows 11 |

Link to comment
Share on other sites

Link to post
Share on other sites

microsoft defence force to the rescue!

/s

 

Don't see where's the foul play here, they've been warned about it and MS did nothing to fix, putting pressure on them by making it public seems to be the best solution to force them on releasing a fix

One day I will be able to play Monster Hunter Frontier in French/Italian/English on my PC, it's just a matter of time... 4 5 6 7 8 9 years later: It's finally coming!!!

Phones: iPhone 4S/SE | LG V10 | Lumia 920 | Samsung S24 Ultra

Laptops: Macbook Pro 15" (mid-2012) | Compaq Presario V6000

Other: Steam Deck

<>EVs are bad, they kill the planet and remove freedoms too some/<>

Link to comment
Share on other sites

Link to post
Share on other sites

I see no problem with doing this if there is total radio silence working with another company. I have no sympathy for microsoft if they were given a week to even say "oh hey thanks for the info we are going to look into that."

 

Its even worse when its a known active exploit, thats just sticking your head in the sand and pretending the world isnt on fire because you cant see it. And releasing it to the public clearly isnt a big deal other than getting press on it, because if 1 hacker is using it, you can bet way more know about it.

 

Microsoft wanted their platform being super secure with everyone on the latest software with forced updates, but that only works if they fix the problems people are having.

Primary:

Intel i5 4670K (3.8 GHz) | ASRock Extreme 4 Z87 | 16GB Crucial Ballistix Tactical LP 2x8GB | Gigabyte GTX980ti | Mushkin Enhanced Chronos 240GB | Corsair RM 850W | Nanoxia Deep Silence 1| Ducky Shine 3 | Corsair m95 | 2x Monoprice 1440p IPS Displays | Altec Lansing VS2321 | Sennheiser HD558 | Antlion ModMic

HTPC:

Intel NUC i5 D54250WYK | 4GB Kingston 1600MHz DDR3L | 256GB Crucial M4 mSATA SSD | Logitech K400

NAS:

Thecus n4800 | WD White Label 8tb x4 in raid 5

Phones:

Oneplux 6t (Mint), Nexus 5x 8.1.0 (wifi only), Nexus 4 (wifi only)

Link to comment
Share on other sites

Link to post
Share on other sites

Google only discloses the vulnerabilities if the company either doesn't acknowledge it, or does little to fix it in an appropriate amount of time. Google in the past has given companies time to fix their software, assuming that they actually acknowledge that the vulnerability exists. 

15" MBP TB

AMD 5800X | Gigabyte Aorus Master | EVGA 2060 KO Ultra | Define 7 || Blade Server: Intel 3570k | GD65 | Corsair C70 | 13TB

Link to comment
Share on other sites

Link to post
Share on other sites

16 minutes ago, Blade of Grass said:

Google only discloses the vulnerabilities if the company either doesn't acknowledge it, or does little to fix it in an appropriate amount of time. Google in the past has given companies time to fix their software, assuming that they actually acknowledge that the vulnerability exists. 

But nobody asked Google to do this!

Judge a product on its own merits AND the company that made it.

How to setup MSI Afterburner OSD | How to make your AMD Radeon GPU more efficient with Radeon Chill | (Probably) Why LMG Merch shipping to the EU is expensive

Oneplus 6 (Early 2023 to present) | HP Envy 15" x360 R7 5700U (Mid 2021 to present) | Steam Deck (Late 2022 to present)

 

Mid 2023 AlTech Desktop Refresh - AMD R7 5800X (Mid 2023), XFX Radeon RX 6700XT MBA (Mid 2021), MSI X370 Gaming Pro Carbon (Early 2018), 32GB DDR4-3200 (16GB x2) (Mid 2022

Noctua NH-D15 (Early 2021), Corsair MP510 1.92TB NVMe SSD (Mid 2020), beQuiet Pure Wings 2 140mm x2 & 120mm x1 (Mid 2023),

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, zMeul said:

source: https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html

 

 

on October 21st, Google contacted MicroSoft over a known and actively exploited Windows vulnerability - they asked them to either acknowledge it or fix it, MicroSoft did neither

so, Google made the existence of the vulnerability public, MicroSoft isn't happy and they're crying foul - this is not the 1st time Google discovered critical vulnerabilities in Windows and made them public after MicroSoft failed to acknowledge and/or fix them

MicroSoft defense is that vulnerabilities should not be disclosed [personally, I believe it's bullshit even more so when the vulnerability is actively exploited]; and 10 days is not enough time to issue a fix

 

thing is, Google notified Adobe over a Flash vulnerability same day as they did with MicroSoft - Adobe fixed their issue on October 26th: https://helpx.adobe.com/security/products/flash-player/apsb16-36.html

Microsoft************

Link to comment
Share on other sites

Link to post
Share on other sites

13 minutes ago, AluminiumTech said:

But nobody asked Google to do this!

And your point is?

15" MBP TB

AMD 5800X | Gigabyte Aorus Master | EVGA 2060 KO Ultra | Define 7 || Blade Server: Intel 3570k | GD65 | Corsair C70 | 13TB

Link to comment
Share on other sites

Link to post
Share on other sites

I was about to side with Microsoft on this, but assuming that it is true that Microsoft did not acknowledge it (as in, did not ask Google for more time nor made an effort to fix the issue as quickly as possible), and on top of that the fact that the exploit is/was already being used in the wild, I think Google did the right thing.

 

By the way, the exploit Google published relies on Flash to be executed in its current form. Since Adobe already released a patch it is kind of fixed. The problem is that the underlying issue (in Windows) is not yet fixed and it might be possible to use it without relying on Flash.

 

So it's not like Google just went "hey Microsoft, you got a security hole in Windows. <10 days later>. Lol, let's tell everyone about the security hole".

Supposedly,

1) Microsoft ignored/did not make an effort to fix the issue after Google told them about it.

2) The exploit was already being used, so attackers already knew about it.

3) Flash, which the exploit relied on had been fixed, so the attack in its current form does not work.

 

 

 

20 minutes ago, AluminiumTech said:

But nobody asked Google to do this!

To do what? Find exploits in code? Plenty of people, organizations and companies ask Google to do it. Finding exploits is a great thing. It makes everyone more safe and secure.

Link to comment
Share on other sites

Link to post
Share on other sites

24 minutes ago, AluminiumTech said:

But nobody asked Google to do this!

Nobody asked the hackers to do it either but they still did, they're now actively exploiting it and MS are totally ignoring it so GJ Google I say.

Main Rig:-

Ryzen 7 3800X | Asus ROG Strix X570-F Gaming | 16GB Team Group Dark Pro 3600Mhz | Corsair MP600 1TB PCIe Gen 4 | Sapphire 5700 XT Pulse | Corsair H115i Platinum | WD Black 1TB | WD Green 4TB | EVGA SuperNOVA G3 650W | Asus TUF GT501 | Samsung C27HG70 1440p 144hz HDR FreeSync 2 | Ubuntu 20.04.2 LTS |

 

Server:-

Intel NUC running Server 2019 + Synology DSM218+ with 2 x 4TB Toshiba NAS Ready HDDs (RAID0)

Link to comment
Share on other sites

Link to post
Share on other sites

I don't really blame Microsoft entirely for their problems.

 

I blame developers who rely on undocumented and deprecated behavior of the OS and demand that Microsoft keep the "feature" for the next release (which Microsoft has to because there's a non-trivial user base who relies on said software).

 

Also please don't be an armchair developer and think that any software problem is "easy" to fix.

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, huilun02 said:

Usually a company would pay or reward bug/exploit reporting, but MS has it backwards.

To be fair, so does much of the world, especially banks and governments. 

15" MBP TB

AMD 5800X | Gigabyte Aorus Master | EVGA 2060 KO Ultra | Define 7 || Blade Server: Intel 3570k | GD65 | Corsair C70 | 13TB

Link to comment
Share on other sites

Link to post
Share on other sites

21 minutes ago, Blade of Grass said:

To be fair, so does much of the world, especially banks and governments. 

a lot of governments in europe have a really open mind about reporting bug's and exploits, my local government holds a hacker competition before launching new systems so the civilians can try pentesting it, i know some baltic states are pushing for complete open source software on every layer of government etc. banks are a different story though...

Link to comment
Share on other sites

Link to post
Share on other sites

The Microsoft defense taskforce hasn't said anything yet...

`

Link to comment
Share on other sites

Link to post
Share on other sites

3 hours ago, OptimisticRealist said:

It is Microsoft! WHERE do you find that capital S????????

686px-Microsoft_logo_(1975).svg.png

Link to comment
Share on other sites

Link to post
Share on other sites

 

This post from an earlier discussion about a similar subject is why I'm not 100% happy about Google doing these kind of things. It may describe a worse-case scenario, but it is an important point nonetheless

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×