PowerPoint patch delay runs counter to 'responsible disclosure' practice A security researcher has called foul on Microsoft for doing exactly what it has thrashed hackers over for years: revealing information that can be used to hijack computers before a patch is available.Swa Frantzen, one of the analysts at SANS Institute’s Internet Storm Center (ISC) criticized Microsoft for issuing patches yesterday that fix the Windows versions of PowerPoint while announcing that patches for the same flaws in the Mac editions would not be released until June.“Microsoft is the one big company screaming loudest over ‘responsible disclosure,'” said Frantzen in a post to the ISC blog late Tuesday. Responsible disclosure, a practice Microsoft has aggressively pushed, demands that researchers delay any disclosure until the bug has been patched. “They want an unlimited amount of time to release their patches before those who found the problem are allowed to publish,” said Frantzen. “[But the] policy cuts both ways: You need to obey the rules yourself just as well as demand it from all others involved.”Microsoft, claimed Frantzen, broke its own rules of responsible disclosure yesterday by revealing that Office for Mac 2004 and Office for Mac 2008 contain three unpatched vulnerabilities, and by releasing information about the same bugs in Windows. The combination, he said, could be used by hackers to craft exploits targeting Macs. “We all know from past experience [that] the reverse engineering of patches back into exploits starts at the time — if not before — the patches are released,” said Frantzen. “,So in the end, Microsoft just released what hackers need to attack.”An online poll that Frantzen posted on the ISC site showed that 47% agreed Microsoft had been irresponsible in omitting patches for the Mac, while about 24% thought Microsoft made the best-possible decision. John Pescatore, an analyst for Gartner who covers security, agreed with the minority. “I think Microsoft did the right thing here,” he said in an e-mail. “I would much rather see solid, well-tested patches for the highest risk vulnerabilities — which means first the ones where there are active exploits out — come out first, rather than wait for all versions to be patched simultaneously, or to rush out immature patches quickly and require re-patching later.”Andrew Storms, director of security operations at nCircle Network Security, took a middle path. “I wouldn’t say that [Frantzen] has gone too far. Microsoft really owns ‘responsible disclosure,’ both in the PR sense and in the sense that they’ve been able to get researchers to do it,” said Storms. “You don’t break your own mantra.“Regardless, I disagree with him,” Storms continued, “simply because the proof-of-concept code has been out there for a month.” If no one has taken that sample code, and used it to investigate, then create a working exploit for the Mac in the past month and more, Storms argued, it was very unlikely that they would go to the additional work of reverse engineering the Windows patches to figure out how to build an exploit for the Mac.“Why would they take the harder path,” Storms asked, “when they haven’t taken the easier?”Microsoft was not able to immediately provide someone from its security response center to argue the company’s side of the responsible disclosure debate, but yesterday it explained the decision to release PowerPoint patches for Windows but not for Mac OS X.“None of the [PowerPoint] exploit samples we have analyzed will reliably exploit the Mac version, so we didn’t want to hold the Windows security update while we wait for Mac packages,” said Jonathan Ness, an engineer with the Microsoft Security Response Center, in a post to a company blog. Related content news analysis Web app, API attacks surge as cybercriminals target financial services The financial services sector has also experienced an increase in Layer 3 and Layer 4 DDoS attacks. By Michael Hill Sep 27, 2023 6 mins Financial Services Industry Financial Services Industry Financial Services Industry news Immersive Labs adds custom 'workforce exercising' for each organizational role With the new workforce exercising capability, CISOs will be able to see each role’s cybersecurity readiness, risk areas, and exercise progress. By Shweta Sharma Sep 27, 2023 3 mins Security Software news Sysdig unveils cloud attack graph based on real-time threat data Sysdig also announced a new cloud inventory and agentless scanning capabilities to tackle cloud security risks. By Michael Hill Sep 27, 2023 3 mins Threat and Vulnerability Management Cloud Security Storage Security feature What’s a cyber incident response retainer and why do you need one? Whether you need to hire a team to respond to any and all cyberattacks or just some hired guns to boost your capabilities, incident response retainers can ensure you’re covered. By Linda Rosencrance Sep 27, 2023 8 mins Cyberattacks Incident Response Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe