Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Microsoft's new 'compiler' program has security flaw, consultancy says
MSNBC (no, really!)/WSJ ^ | Feb. 14 | Don Clark

Posted on 02/14/2002 8:00:17 AM PST by B Knotts

Feb. 14 - A Microsoft Corp. technology for plugging a common security hole is vulnerable to the very attack it was designed to prevent, a prominent security consultancy said.

AT ISSUE IS a new version of a special-purpose program, called a compiler, that is included in a high-profile collection of programming tools Microsoft announced Wednesday at a gathering for software developers in San Francisco. The timing of the discovery is doubly embarrassing, coming a month after Microsoft Chairman Bill Gates announced a companywide commitment to improve the security features of its software. (MSNBC is a Microsoft-NBC joint venture.)

Researchers at Cigital, of Dulles, Va., said they discovered the problem in a compiler that comes as part of Visual C++.NET, a new version of a popular Microsoft programming tool. Compilers help translate code that programmers write into a language that computers understand. Microsoft modified the compiler to help prevent what are called buffer overflows, a common hacker attack that makes it possible to replace instructions in a program with malicious code.

Gary McGraw, Cigital's chief technology officer, said Microsoft apparently adopted a technique for improving its compiler that has been used with the Linux operating system and shown to be vulnerable to attack. As a result, he said, Visual C++.NET isn't actually more safe than earlier versions; in fact, it could lead programmers to write more programs that are vulnerable to buffer-overflow attacks.

"They were trying to avoid flaws, but instead managed to create a flaw seeder," Mr. McGraw said.

Cigital informed Microsoft of the discovery Wednesday. Jim Desler, a Microsoft spokesman, said the company was in the process of investigating it. "This appears to be a relatively narrow and technical deficiency," Mr. Desler said.

Avi Rubin, a principal researcher at AT&T Labs, characterized the discovery as "big news" in the security field. "This is the height of irony," said Mr. Rubin, author of the book "White-Hat Security Arsenal." "It's almost like the measures you are taking to be more secure are causing you to be more insecure."

Despite heavy publicity about security problems, researchers and hackers continue to uncover flaws in popular programs. On Tuesday, for example, a government-backed security group issued a widespread alert about a flaw in a fundamental technology used in products from hundreds of companies. Mr. Gates, exasperated by reports of security bugs in Microsoft's products, last month issued an internal memo that called for a broad "Trustworthy Computing" initiative, which includes better training for Microsoft programmers in writing more-secure computer code. His speech Wednesday in San Francisco touched on the security advantages of its new Visual Studio.NET programming tools, an important part of the company's plans for Web services.

To some extent, Microsoft has been racing to match security features of the Java programming technology developed by rival Sun Microsystems Inc., including a concept called "managed code" that effectively limits buffer overflow attacks. Mr. McGraw and Jeffrey Payne, Cigital's chief executive, applauded Microsoft's use of such techniques and acknowledged that managed code created with Visual C++.NET shouldn't be vulnerable. The timing of such disclosures is a hot topic. Microsoft has convinced some security firms to wait before publicly reporting such flaws until 30 days after a software fix is available. Mr. Desler said it was irresponsible for Cigital to give the company so little time to respond and alert customers. "We are very concerned about the way it was disclosed to us," he said.

Mr. Desler also said Cigital had been a candidate to review the company's .NET security technology, but another security firm was selected instead, suggesting that Cigital had a particular reason to snub Microsoft.

"We don't pick targets of security alerts out of malevolence," responded Mr. McGraw, co-author of the book "Building Secure Software." He added that delaying disclosures makes sense when products are already in the field waiting to be attacked. In this case, he said, Cigital wanted to warn programmers before they start relying on the Microsoft product.


TOPICS: Business/Economy; News/Current Events
KEYWORDS: computersecurityin; microsoft; techindex
Navigation: use the links below to view more comments.
first 1-2021-26 next last

1 posted on 02/14/2002 8:00:17 AM PST by B Knotts
[ Post Reply | Private Reply | View Replies]

To: tech_index;Dominic Harr; CheneyChick; bwteim; toupsie; daviddennis; nunya bidness
ping
2 posted on 02/14/2002 8:02:07 AM PST by B Knotts
[ Post Reply | Private Reply | To 1 | View Replies]

To: B Knotts
Keep in mind that Visual Studio .NET was the first product to pass Microsoft's new "stringent" security audit.
3 posted on 02/14/2002 8:05:12 AM PST by B Knotts
[ Post Reply | Private Reply | To 1 | View Replies]

To: B Knotts
As a result, he said, Visual C++.NET isn't actually more safe than earlier versions; in fact, it could lead programmers to write more programs that are vulnerable to buffer-overflow attacks.

"They were trying to avoid flaws, but instead managed to create a flaw seeder," Mr. McGraw said.

"This is the height of irony," said Mr. Rubin, author of the book "White-Hat Security Arsenal." "It's almost like the measures you are taking to be more secure are causing you to be more insecure."

The timing of such disclosures is a hot topic. Microsoft has convinced some security firms to wait before publicly reporting such flaws until 30 days after a software fix is available.

The stooges are out there trying to sell your bank on using .NET.

.NET has some nice stuff in it. But wait until it's been a year since the last exploits before using it for any mission-critical apps.

4 posted on 02/14/2002 8:06:18 AM PST by Dominic Harr
[ Post Reply | Private Reply | To 2 | View Replies]

To: B Knotts
Keep in mind that Visual Studio .NET was the first product to pass Microsoft's new "stringent" security audit.

Holy cow. That piece deserves a post of it's own.

That's explosive news.

'Trustworthy Computing' has a ways to go.

5 posted on 02/14/2002 8:07:36 AM PST by Dominic Harr
[ Post Reply | Private Reply | To 3 | View Replies]

To: B Knotts
Good grief. Two words come to mind. Keystone Cops.
6 posted on 02/14/2002 8:07:49 AM PST by Hoosier Patriot
[ Post Reply | Private Reply | To 1 | View Replies]

To: B Knotts
This is progress.

Use to be that MS programmers had to specifically code in a buffer-overflow vulnerability.

Now they've created a compiler that can automatically build in one, without the developer having to go to the trouble!

7 posted on 02/14/2002 8:11:09 AM PST by Dominic Harr
[ Post Reply | Private Reply | To 3 | View Replies]

To: B Knotts
Wait, you got to be kidding me! Microsoft with a security problem in their software? I thought Bill Gates just laid down the law about refocusing Microsoft to be #1 in the area of product security.

Has Microsoft's VP of Marketing, Bush2000, chimed in on this situation? Inquiring minds want to know!

From what I have read, Microsoft's C# is a hacker's dream. About every app it produces is prone to buffer overflows.

8 posted on 02/14/2002 9:07:59 AM PST by toupsie
[ Post Reply | Private Reply | To 1 | View Replies]

To: B Knotts;*Microsoft;*Computer Security In
Bump List
9 posted on 02/14/2002 9:10:38 AM PST by Free the USA
[ Post Reply | Private Reply | To 2 | View Replies]

To: Dominic Harr
I have had the opportunity to look at .Net and it is not Visual Basic 7.0 or Visual C++ 7.0. It is a whole other product. Frankly, unless you are making heavy use of ASP or COM servers, there is no reason to use it.

I see the VB market dividing into heavy Web users who will go to .Net but most of the market consisting of "legacy" VB 6.0 users who cannot justify the conversion cost.

10 posted on 02/14/2002 9:58:58 AM PST by Tokhtamish
[ Post Reply | Private Reply | To 4 | View Replies]

To: toupsie
Has Microsoft's VP of Marketing, Bush2000, chimed in on this situation? Inquiring minds want to know!

He probably doesn't want to bump the thread. :-)

BUMP

11 posted on 02/14/2002 10:43:27 AM PST by B Knotts
[ Post Reply | Private Reply | To 8 | View Replies]

To: B Knotts
I'll BUMP to that! But he's probably busy patching....
:>)
12 posted on 02/14/2002 12:04:36 PM PST by bwteim
[ Post Reply | Private Reply | To 11 | View Replies]

To: bwteim, BKnotts
Imagine the pow wow that must be going on in the MS PR dept Mr. Shrub2k must work in. They haven't worked up the 'talking points' on this one yet.

We know the last 'talking point' was 'Linux is less secure than Windows'.

Any guesses on how the gang is going to end up 'spinning' now?

Think back. What would a Clinton do?

Attack a small, 3rd world nation?

13 posted on 02/14/2002 12:34:24 PM PST by Dominic Harr
[ Post Reply | Private Reply | To 12 | View Replies]

To: Dominic Harr
It's not a bug; it's a feature.
14 posted on 02/14/2002 12:39:42 PM PST by AppyPappy
[ Post Reply | Private Reply | To 13 | View Replies]

To: Dominic Harr;B Knotts
These topics don't get much interaction.... hard to fight a headline like this thread. And BK was right in tweaking his source at head, the WSJ (not MSNBC) had it this morning, a quarter page on page B6, Feb. 14, 2002. "Cigital Says Microsoft Program Isn't Secure". BK had:
MSNBC (no, really!)/WSJ | Feb. 14 | Don Clark
15 posted on 02/14/2002 12:42:34 PM PST by bwteim
[ Post Reply | Private Reply | To 13 | View Replies]

To: AppyPappy
It's not a bug; it's a feature.

Ha!

16 posted on 02/14/2002 12:59:05 PM PST by Dominic Harr
[ Post Reply | Private Reply | To 14 | View Replies]

To: Dominic Harr
Ya know, this could actually be part of a strategy to keep the installed base dependent on Microsoft sticking around. Use MS code, you'll need MS patches. Next thing will be Service Packs for Service Packs.

Oh wait... they're already doing that.

17 posted on 02/14/2002 1:08:29 PM PST by TechJunkYard
[ Post Reply | Private Reply | To 7 | View Replies]

To: bwteim
But he's probably busy patching....

Maybe Patch2000 is on the phone with HQ, trying to figure out which patches need patches. I know I lost track a long time ago.

But you've gotta admit, there is a certain logic to getting all patched-up before resuming the noble mission to expose all trolls.

18 posted on 02/14/2002 1:24:29 PM PST by InfraRed
[ Post Reply | Private Reply | To 12 | View Replies]

To: B Knotts
MS fumbles the ball,throws interceptions, gets kick blocked , cant kick a field goal, get's called on penalties and yet they still win. Says something about their alleged competition doesn't it?? - Tom
19 posted on 02/14/2002 1:35:51 PM PST by Capt. Tom
[ Post Reply | Private Reply | To 2 | View Replies]

To: Capt. Tom
Define "win" in this context.
20 posted on 02/14/2002 2:09:37 PM PST by TechJunkYard
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-26 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson