Microsoft
has paid $100,000 (£62,600) to the British researcher James Forshaw for
finding a critical security flaw in the software firm's upcoming Windows 8.1 operating system.
Forshaw, a researcher for the security firm Context, found a "mitigation bypass" - a hack that circumvented the protection systems built into Windows 8.1 which could have allowed hackers widespread access to the system.
"While we can't go into the details of this new mitigation bypass technique until we address it, when we strengthen platform-wide mitigations, we make it harder to exploit bugs in all software that runs on our platform, not just Microsoft applications," said Microsoft's senior security strategist, Katie Moussouris.
Forshaw said it had taken three and a half weeks to find the flaw, responding to "a very specific brief" from Microsoft.
"I think I originally came up with the winning idea sitting at home, pondering what I could do. When it comes to vulnerability testing, though, the eureka moment is more about the final working proof of concept. There are so many stumbling blocks that can trip you up along the way that you just can't get too excited too quickly."
Despite the $100,000 bounty, Forshaw said: "We're not talking retirement money here. When it comes to security flaw bounties like this, most of it goes to the company, and even if it didn't, once the taxman has taken his cut it's certainly not a life-changing sum."
He said using outside experts was "just part of the process because of the scale of the task involved. Microsoft has a fairly extensive security department that actively looks for software flaws in its products, but sometimes it's a case of being too close to the product – you simply can't see the wood for the trees.
"You need to step back and look at the entire product and its interactions to find the higher-level vulnerabilities, like this mitigation bypass."
Outsourcing was also necessary from a monetary point of view, he said: "You couldn't dedicate enough resources to find everything – it's cheaper to pay external researchers bounties. Ultimately there's only a finite pool of talented people who can find vulnerabilities in these products."
Arguably, the bugs and vulnerabilities shouldn't exist in the first place, but "humans are fallible and you can't write perfect code," he said.
http://www.theguardian.com/technology/2013/oct/10/microsoft-100000-british-researcher-windows-bug
Forshaw, a researcher for the security firm Context, found a "mitigation bypass" - a hack that circumvented the protection systems built into Windows 8.1 which could have allowed hackers widespread access to the system.
"While we can't go into the details of this new mitigation bypass technique until we address it, when we strengthen platform-wide mitigations, we make it harder to exploit bugs in all software that runs on our platform, not just Microsoft applications," said Microsoft's senior security strategist, Katie Moussouris.
Forshaw said it had taken three and a half weeks to find the flaw, responding to "a very specific brief" from Microsoft.
"I think I originally came up with the winning idea sitting at home, pondering what I could do. When it comes to vulnerability testing, though, the eureka moment is more about the final working proof of concept. There are so many stumbling blocks that can trip you up along the way that you just can't get too excited too quickly."
Despite the $100,000 bounty, Forshaw said: "We're not talking retirement money here. When it comes to security flaw bounties like this, most of it goes to the company, and even if it didn't, once the taxman has taken his cut it's certainly not a life-changing sum."
He said using outside experts was "just part of the process because of the scale of the task involved. Microsoft has a fairly extensive security department that actively looks for software flaws in its products, but sometimes it's a case of being too close to the product – you simply can't see the wood for the trees.
"You need to step back and look at the entire product and its interactions to find the higher-level vulnerabilities, like this mitigation bypass."
Outsourcing was also necessary from a monetary point of view, he said: "You couldn't dedicate enough resources to find everything – it's cheaper to pay external researchers bounties. Ultimately there's only a finite pool of talented people who can find vulnerabilities in these products."
Arguably, the bugs and vulnerabilities shouldn't exist in the first place, but "humans are fallible and you can't write perfect code," he said.
http://www.theguardian.com/technology/2013/oct/10/microsoft-100000-british-researcher-windows-bug
No comments:
Post a Comment