Microsoft to banish 'responsible' from disclosure debate

    Microsoft to banish 'responsible' from disclosure debate


    Posted: 26 Jul 2010

    Microsoft has submitted a proposal aimed at quelling one of the oldest debates in security circles: retiring the use of the term “responsible disclosure”.

    The software maker wants to replace the term with the less pejorative phrase “coordinated vulnerability disclosure.” The hope is that software makers and researchers can put aside decade-old differences about the best way to handle critical defects so that end users are best protected.

    “We don't want an emotionally laden term clouding the debate, and that's definitely gotten in the way of a lot of good discussions between like-minded people in security,” said Katie Moussouris, senior security strategist in the Microsoft Security Response Center. “We're really trying to reach out across the disclosure dividing lines and find the common ground where we all are. We all want to protect customers and users.”

    The modest proposal comes a month after the public disclosure of an unpatched vulnerability took the debate to new highs. On June 9, Researcher Tavis Ormandy dropped detailed information about a critical bug in older versions of Windows that allowed attackers to take full control of a PC by luring its user to a booby-trapped website. Ormandy said he had notified Microsoft of the vulnerability just five days earlier, on a Saturday, and decided to take his advisory public when Microsoft didn't commit to fixing the flaw within two months.

    Moussouris told The Register the company was unable to give Ormandy a timeline until it had finished investigating the bug, which resides in the Help Center of Windows XP and Server 2003 and was fixed earlier this month. Ormandy didn't respond to a request to comment by time of publication. Within days of the disclosure, reports began circulating that the previously undocumented flaw was being exploited by attackers.

    Some people in security circles, including those at Microsoft, responded by noting that Ormandy worked for Google, and criticized him for releasing the details before Microsoft had a chance to fix the vulnerability, as the tenets of responsible disclosure hold.

    On Tuesday, this Google blog post, which was co-written by Ormandy, criticized the term.

    “The important implication of referring to this process as 'responsible' is that researchers who do not comply are seen as behaving improperly,” the post stated. “However, the inverse situation is often true: it can be irresponsible to permit a flaw to remain live for such an extended period of time.”

    In Ormandy's post on the Full-disclosure forum — which he said represented his private opinion — he went further.
    Source -
    Microsoft to banish 'responsible' from disclosure debate • The Register
    Posted By: JMH
    26 Jul 2010



  1. Posts : 2,303
    Windows 7 & Windows Vista Ultimate
       #1

    The issue of "disclosure" is a pet peeve of mine. In my opinion, it is irresponsible for any researcher to publicly disclose the details of a vulnerability, particularly one that is not in the wild. Regardless of whether the process is called "Responsible Disclosure" or "Coordinated Vulnerability Disclosure" or whether "in the wild" or not, those who expect immediate response when a vulnerability is reported need to keep some things in mind.

    The most important aspect of making a software change is to make one change at a time and "test, test, and test again" after each change. Even after stringent tests are conducted, to ensure the change does not "break" something else, it is necessary to translate the changes to the many supported languages -- and test yet again. I would much rather wait the extra time for the testing to be properly conducted than get buggy updates!

    The quote below the MMPC blog, Protection for New Malware Families Using .LNK Vulnerability, illustrates precisely why it is my opinion that it is irresponsible by researchers to release proof-of-concept details to the public:

    What we’re seeing with the use of this new vulnerability by two other malware families is typical when an exploitable vulnerability is made public: initially, details emerge about a proof-of-concept malware or a targeted attack, then someone releases a public exploit, then the exploit gets incorporated into malware crime kits, and then we begin seeing different families using it.
    Additional References:

      My Computer


  2. Posts : 10,200
    MS Windows 7 Ultimate SP1 64-bit
       #2

    As a user, I'd like to see less finger-pointing or more problem-solving.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 12:54.
Find Us