Forum Moderators: goodroi
Google security researcher Tavis Ormandy has set the cat among the “responsible disclosure” pigeons with the release of technical details of a zero-day vulnerability affecting the Microsoft Windows Help and Support Center without giving Microsoft adequate time to prepare a patch.
Are people really thinking Google's Employee behaved responsibly? Really?
are those expected? really?
Google security researcher Tavis Ormandy has set the cat among the “responsible disclosure” pigeons with the release of technical details of a zero-day vulnerability affecting the Microsoft Windows Help and Support Center without giving Microsoft adequate time to prepare a patch.
One of the main reasons we and many others across the industry advocate for responsible disclosure is that the software vendor who wrote the code is in the best position to fully understand the root cause. While this was a good find by the Google researcher, it turns out that the analysis is incomplete and the actual workaround Google suggested is easily circumvented. In some cases, more time is required for a comprehensive update that cannot be bypassed, and does not cause quality problems.
I’ve concluded that there’s a significant possibility that attackers have studied this component, and releasing this information rapidly is in the best interest of security
The current design is actually pretty sound, I'm sure Microsoft are
dissapointed they missed this flaw. In their defense, I think there's a good
chance I would have also missed this in code review.
Without access to extremely smart colleagues, I would likely have given up,
leaving you vulnerable to attack from those who just want root on your network
and do not care about disclosure policies.
[edited by: TheMadScientist at 10:44 pm (utc) on Jun 12, 2010]
Sometimes, a bug is not an isolated flaw, but represents an error of thinking or planning on the part of the programmer. Such logic errors require a section of the program to be overhauled or rewritten.
He is STILL a Google employee AFAIK...
If you have a source that says he's left or been asked to leave, please cite it.
Would you agree the M$ users got (get) what they deserve for purchasing the system in the first place, so M$ is really absolved of the responsibility, because if the end user did not do their homework and bought a bug filled, security weak system it's really their own fault?
One of the main reasons we and many others across the industry advocate for responsible disclosure is that the software vendor who wrote the code is in the best position to fully understand the root cause. While this was a good find by the Google researcher, it turns out that the analysis is incomplete and the actual workaround Google suggested is easily circumvented. In some cases, more time is required for a comprehensive update that cannot be bypassed, and does not cause quality problems.
Some very elite friends have started a consultancy called inverse path, you
should really hire them.
he didn't report this bug for the security of M$ users he did it to further his own agenda(s) and worded a great 'feel good' sales pitch to justify his actions.
This work is my own, and all of the opinions expressed are mine, not my
employers or anybody elses (I added this for you, Dan. Thanks ;-)).
don't particularly care for M$, but absolutely despise the idea of this guy making their users (people who post here) susceptible to having their computer's and personal information compromised under the guise of doing them a favor
Today, five days after disclosure, malware authors began attacking this exploit on XPs (report from zdnet security blog).
Well done, google security guy. Without you there would be at least one fewer attack vector known by hackers.
And well done to all his "clever" colleagues for helping him, too. :(