[Infowarrior] - MS giving partners heads-up on security vulnerabilities
Richard Forno
rforno at infowarrior.org
Tue Aug 5 18:00:30 UTC 2008
Microsoft to give partners heads-up on security vulnerabilities
Posted by Elinor Mills 2 comments
http://news.cnet.com/8301-1009_3-10006325-83.html?hhTest=1&part=rss&subj=news&tag=2547-1_3-0-20
Microsoft will be giving companies that sell security software and
services to its customers a sneak peek at the technical details of the
vulnerabilities in Microsoft software before the company releases its
monthly "Patch Tuesday" updates.
The new Microsoft Active Protections Program, set to be announced at
the Black Hat security conference on Tuesday, is designed to give
software vendors a chance to prepare updates to their software before
attackers have a chance to reverse engineer Microsoft's security patch
and create an exploit.
"It's essentially a race between the attackers and the protectors,"
said Andrew Cushman, who runs the Microsoft Security Response Center.
The program will "give a head start to software providers delivering
security features to our mutual customers."
"It will save (vendors) the work of reverse engineering the patch and
identifying where the vulnerability is and what triggers the
exploitability," he said.
Cushman did not say how vendors would be notified or how much lead
time they would get. Software companies that provide protection
against host-based or network-based attacks will have to apply for
membership to the program and be accepted. They and Microsoft will
then be under mutual non-disclosure agreements, he said.
"The goal is to give it to them so they can have updates available as
close to 10 a.m. as possible" on the second Tuesday of every month,
Cushman said.
The program will begin in October. Microsoft has already floated the
idea by IBM/ISS, TippingPoint and Juniper, he said.
Microsoft also will be providing an Exploitability Index in its
monthly security bulletins beginning in October that will help
organizations prioritize vulnerabilities by assigning one of three
ratings to each one based on the likelihood of exploits being
developed. The ratings from most severe to least severe are:
"exploitation is likely to occur and to be reliable," "exploitation is
likely to occur but with inconsistent reliability" and "exploitation
is unlikely to occur," according to Cushman.
More information about the Infowarrior
mailing list