Menu
Google discloses unpatched Windows vulnerability

Google discloses unpatched Windows vulnerability

Microsoft didn't fix the bug within a 90-day deadline Google imposed

A Google researcher has disclosed an unpatched vulnerability in Windows 8.1 after Microsoft didn't fix the problem within a 90-day window Google gave its competitor.

The disclosure of the bug on Google's security research website early this week stirred up a debate about whether outing the vulnerability was appropriate.

The bug allows low-level Windows users to become administrators in some cases, but some posters on the Google site said the company should have kept its mouth shut. Google said it was unclear if versions of the Windows OS earlier than 8.1 were affected by the bug.

"Automatically disclosing this vulnerability when a deadline is reached with absolutely zero context strikes me as incredibly irresponsible and I'd have expected a greater degree of care and maturity from a company like Google," one poster at the Google site wrote.

The vulnerability is "your average" local privilege escalation vulnerability, the same poster wrote. "That's bad and unfortunate, but it's also a fairly typical class of vulnerability, and not in the same class as those that keep people like me up at night patching servers," the poster said. "The sad reality is that these sort of vulnerabilities are a dime a dozen on Windows."

Another poster, in what may be a slight overstatement, suggested the versions of Windows affected are run by "billions" of computer users. "Exposing vulnerabilities like this has far reaching consequences," the poster wrote. "People could get hurt by this and it doesn't bring anyone closer to a solution. When an organization is as big and powerful as [Google], people working there need to think of themselves as stewards of a great power and work to be fair and regulate the harm that can come of misusing this great power when possible."

Other posters praised Google for sticking to a deadline it's had in place since it launched its Project Zero bug-tracking team last July. "No one is done any good by keeping it secret," one poster wrote. "By exposing the [vulnerability] they allow those billions who may be running vulnerable systems to be aware of the threat to their own security and take countermeasures. A patch isn't the only way to mitigate the issue. Given the nature of this vulnerability, there are other steps administrators can take to start protecting their vulnerable systems while they await a patch."

Microsoft said in a statement it is working to release a security update to the reported vulnerability. "It is important to note that for a would-be attacker to potentially exploit a system, they would first need to have valid logon credentials and be able to log on locally to a targeted machine," a spokesman said by email. "We encourage customers to keep their anti-virus software up to date, install all available security updates and enable the firewall on their computer."

Google, in a statement published on Engadget, defended the release of the vulnerability information.

Google's 90-day deadline for fixing bug is "the result of many years of careful consideration and industry-wide discussions about vulnerability remediation," the company said. "Security researchers have been using roughly the same disclosure principles for the past 13 years ... and we think that our disclosure principles need to evolve with the changing infosec ecosystem. In other words, as threats change, so should our disclosure policy."

Google will monitor the effects of its policy closely, the company added. "We want our decisions here to be data driven, and we're constantly seeking improvements that will benefit user security," the company added. "We're happy to say that initial results have shown that the majority of the bugs that we have reported under the disclosure deadline get fixed under deadline, which is a testament to the hard work of the vendors."

Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's email address is grant_gross@idg.com.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags GooglemicorsoftExploits / vulnerabilities

Featured

Slideshows

The making of an MSSP: a blueprint for growth in NZ

The making of an MSSP: a blueprint for growth in NZ

Partners are actively building out security practices and services to match, yet remain challenged by a lack of guidance in the market. This exclusive Reseller News Roundtable - in association with Sophos - assessed the making of an MSSP, outlining the blueprint for growth and how partners can differentiate in New Zealand.

The making of an MSSP: a blueprint for growth in NZ
Reseller News Platinum Club celebrates leading partners in 2018

Reseller News Platinum Club celebrates leading partners in 2018

The leading players of the New Zealand channel came together to celebrate a year of achievement at the inaugural Reseller News Platinum Club lunch in Auckland. Following the Reseller News Innovation Awards, Platinum Club provides a platform to showcase the top performing partners and start-ups of the past 12 months, with more than ​​50 organisations in the spotlight.​​​

Reseller News Platinum Club celebrates leading partners in 2018
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP has honoured its leading partners in New Zealand during 2018, following 12 months of growth through the local channel. Unveiled during the fourth running of the ceremony in Auckland, the awards recognise and celebrate excellence, growth, consistency and engagement of standout Kiwi partners.

Meet the top performing HP partners in NZ
Show Comments