Americas

  • United States

Asia

Oceania

Security Group ZERT Patches New IE Bug

News
Sep 25, 20063 mins
CSO and CISOData and Information Security

Microsoft may be waiting until next month to patch a nasty bug in Outlook and Internet Explorer, but security researchers are offering users a more immediate option.

A loose affiliation of security researchers going by the name of Zeroday Emergency Response Team (ZERT) has released a patch for the vector markup language vulnerability (VML), which increasingly is being exploited by criminals in malware attacks.

Microsoft is scheduled to fix the bug on Oct. 10, the date it has set to release its monthly batch of security updates, but the company is under increasing pressure to release an earlier, “out-of-cycle” patch. On Friday the SANS Internet Storm Center raised its alert level from green to yellow, an indication that attacks are becoming more widespread.

Microsoft has suggested a number of work-arounds to the problem, and the software vendor does not recommend that users install the ZERT patch, released Friday.

“We think it’s great that there are people out there working to help protect our customers. But as we’ve always said, we cannot endorse third party updates,” wrote Microsoft Security Response center operations manager Scott Deacon in a blog posting Friday. That posting can be found here.

Microsoft’s suggested work-around can be found here.

Microsoft rigorously tests its patches to try to cut off any problems that the new software might introduce. The ZERT patch has not been widely tested and could introduce new problems when installed, security experts warn.

ZERT plans to continue to release its own patches when particularly critical unpatched flaws begin to pose a “serious risk to the public, the infrastructure of the Internet or both,” the group claims in a manifesto, published on its Web site.

“The purpose of ZERT is not to ’crack’ products, but rather to ’uncrack’ them by averting security vulnerabilities in them before they can be widely exploited,” the group says.

ZERT sprang out of discussions on e-mail lists set up a few years ago by security researcher Gadi Evron, said ZERT member Randy Abrams, director of technical education with Eset in San Diego.

“Microsoft wants to assign a monthly patch and we understand that,” said ZERT member Roger Thompson, who is chief technology officer with Atlanta’s Exploit Prevention Labs. “There’s a certain benefit of staying on the monthly patch, but when things start to pop, as we think this VML thing is, there’s a need to do something.”

The group’s formation was spurred by Microsoft’s Windows Metafile vulnerability, which emerged in late 2005. Tens of thousands of Microsoft users downloaded third-party patches to fix that bug and Microsoft was eventually forced to release an out-of-cycle patch to address the problem.

“This has been the first real vulnerability [since then] that the members have felt can be patched fairly quickly,” Abrams said.

Microsoft clearly does not want its users to get into the habit of installing third-party security patches, so if the ZERT software is widely downloaded, Microsoft may move more quickly with its own VML patch, Abrams said.

“It might force Microsoft’s hand on an out-of-cycle patch,” he said.

Microsoft’s Deacon said that his team has still not seen “widespread” exploitation of the VML bug, but he implied that Microsoft could do an early patch release, if necessary.

“We’ve become more confident in the past couple of days in our ability to do an out-of-band release,” he wrote Friday, in an update to his blog posting.

By Robert McMillan, IDG News Service (San Francisco Bureau)

Keep checking in at our Security Feed for updated news coverage.