Forum Moderators: goodroi
Google security researcher Tavis Ormandy has set the cat among the “responsible disclosure” pigeons with the release of technical details of a zero-day vulnerability affecting the Microsoft Windows Help and Support Center without giving Microsoft adequate time to prepare a patch.
the issue was reported June 5th, 2010 (a Saturday) and then made public less than four days later. “Public disclosure of the details of this vulnerability and how to exploit it, without giving us time to resolve the issue for our potentially affected customers, makes broad attacks more likely and puts customers at risk,” he said, stressing that the workaround suggested by Ormandy is inadequate.
[edited by: true_INFP at 1:18 pm (utc) on Jun 11, 2010]
Asked for comment on Ormandy's disclosure activities, a Google spokesperson said: "Tavis acted independently using research conducted in his own time. Tavis' personal views on disclosure don't necessarily reflect the views of his colleagues at Google or Google as a whole."
In any case, by doing that, he knowingly made millions of Windows XP users vulnerable
without giving Microsoft adequate time to prepare a patch
With Google prepping a desktop Operating System, it would be wise to remember that old saying, "what goes around - comes around".
[edited by: TheMadScientist at 6:11 pm (utc) on Jun 11, 2010]
true_INFP, it was a reply to your comment of "No need to get overly upset."
To determine if it is a security risk for them to run, which they have decided it is.
If enough security guys sit around and noodle they will find flaws in every system google runs from the inside out.
Public disclosure of the details of this vulnerability and how to exploit it, without giving us time to resolve the issue for our potentially affected customers, makes broad attacks more likely and puts customers at risk
[edited by: Sgt_Kickaxe at 7:14 pm (utc) on Jun 11, 2010]
[edited by: londrum at 7:16 pm (utc) on Jun 11, 2010]
I am by no means defending how they went about this but you can't criticize a security guy for looking for security flaws on his network
This seems like they did it just to create bad PR for MS, and maybe to get the info into the hands of the wrong people
Looks like a someone is going after servers running IIS using a specific malicious script to exploit a vulnerability contained within IIS.
It allows for mass SQL injections and reportedly 10s of thousands of sites are already effected.
[edited by: TheMadScientist at 7:01 pm (utc) on Jun 12, 2010]