- SW Community Home
- >
- Software
- >
- Security Research
- >
- HPSR, Microsoft, disclosure, and the $125,000 bug bounty
-
-
Communities
- Communities
- Software Home
- Software Product Forums
- Protect724
- Management, Lifecycle Agile & Planning
- Quality & Testing
- ITSM Community
- Announcements
- Software Events
- Protect724 Events
- Tips and Tricks
- Feedback
- Misc Forums
- IT4IT™ Value Chain
-
Blogs
- All About the Apps
- ArcSight Blog
- Backup and Governance
- Big Data
- Fortify Blog
- IT Operations Management (ITOM)
- IT Service Management
- LoadRunner and Performance Center
- P724 Community Blog
- Protect Your Assets
- Quality and Testing Blog
- Security Research
- Software Solutions
- Voice of the Customer – Interviews by Dana Gardner
- Quick Links
- Protect724
-
Communities
-
Communities
- SW Overview
- Software Home
- Software Product Forums
- Software Events
- Protect 724 Events
- Tips & Tricks
- Feedback
- IT Communities
- Management, Lifecycle Agile & Planning
- Quality & Testing
- ITSM Community
- (Coming soon) IT Operations Management Community
- Protect724
- Misc. Forums
- IT4IT™ Value Chain
-
Blogs
-
Quick LinksProtect724Product List
- Agile Manager
- ALM & ALM Octane
- Application Integration
- Application Performance Mgnt (BAC / BSM)
- Application Security
- AppPulse
- ArcSight
- Big Data
- Business Process Testing
- Client Automation
- Cloud Automation and Orchestration
- Cloud Optimizer
- CMS – Universal CMDB and Universal Discovery
- Data Center Automation
- Data Protector
- Database and Middleware Automation
- Diagnostics Software
- Fortify
- Functional Testing / QTP
- Integrated Archive Platform
- IT Asset Manager
- IT Executive Scorecard and Financial Management
English
HPSR, Microsoft, disclosure, and the $125,000 bug bounty
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Email to a Friend
- Printer Friendly Page
- Report Inappropriate Content
HPSR, Microsoft, disclosure, and the $125,000 bug bounty
HPSR, Microsoft, disclosure, and the $125,000 bug bounty
HP Security Research (HPSR) is pleased to announce that three of our Zero Day Initiative (ZDI) team members -- Brian Gorenc, AbdulAziz Hariri, and Simon Zuckerbraun -- have won the Microsoft Mitigation Bypass Bounty and Blue Hat Bonus for Defense. To collect the main $100,000 prize, the team outlined techniques and steps to attack the Isolated Heap and MemoryProtection functions in the latest version of Microsoft Internet Explorer. Along with this, they describe how an attacker can use MemoryProtection as an oracle to completely bypass ASLR. Both of these features are designed to prevent the successful exploitation of certain use-after-free (UAF) vulnerabilities. They backed that up with an idea for successfully defending systems against the technique they found, earning another $25,000.
And they won’t keep a cent of it. Let me explain.
The team and the challenge
As most readers know, our Zero Day Initiative is a bug-bounty powerhouse, spending more to buy software vulnerabilities over the past nine years ($12 million and counting) than any other program in the world. To do so effectively we hire a staff of world-class researchers, who divide their time between validating submissions from external contributors in their security lab and performing their own investigations as part of the HP Security Research group.
Simon and AbdulAziz both started with the ZDI as external contributors, submitting (among other things) a number of Microsoft Internet Explorer (IE) use-after-free (UAF) vulnerabilities. Over time, both hired on with HPSR as full-time employees, working with team manager and sandbox expert Brian.
Internet Explorer’s use-after-free problems continued, and our researchers continued to chase them. But in the summer of 2014, IE exploitation mechanisms that had been reliable started to behave differently. The team suspected the changes were due to two new mitigations – Isolated Heap and MemoryProtection (MemProtect) – Microsoft silently folded into IE through the June and July security patches.
Change is good, particularly for a browser with a history of UAF problems. The addition of MemProtect and Isolated Heap “really started to up [Microsoft’s] game in hardening Internet Explorer against memory corruption vulnerabilities,” Simon explains. But change is also a natural target for investigation, particularly of the kind that turns into published research – and HPSR is a research organization.
Suddenly it wasn’t about looking at individual software vulnerabilities, but at ways of partially or fully bypassing an entire protection mechanism. Not only was the ZDI not sure what it would find, it wasn’t sure how precisely it would proceed when it found its results.
Notification and publication
Simon’s portion of the investigation focused on reverse-engineering MemProtect and figuring out its precise effect on UAF vulns. He summarized his findings – including a warning that MemProtect is ineffective or only partially effective for certain classes of UAF – on the HP Security Research blog in late July. Brian, fresh off a Black Hat presentation on sandbox bypasses, followed with an HPSR Security Briefing looking at new ways in which that can be accomplished. And Abdul followed up in September with a Briefing looking at all of Microsoft’s UAF mitigations with special attention to Isolated Heap – which he found can be bypassed in many circumstances.
HPSR is a research group, and research groups publish their findings. That means talking openly about potential issues, as we did in those posts and presentations and papers. But security researchers must balance the need to publish and the need to protect. To strike that balance, we trusted our own 120-day coordinated-disclosure policy to guide us. We notified Microsoft and, since the discovery met the qualifications for their Mitigation Bypass Bounty, we decided to format our submission in the contest-required style and submit an appropriate proof-of-concept -- separate from and far more detailed than the research we’d published so far.
Was it weird being on the other side of the bounty-payout fence for a change? Very. Turns out that even if you’re used to paying out seven-figure sums to researchers each year, when the money’s flowing the other way, time passes a bit more slowly. After a lengthy review process, Microsoft agreed that the submission did what it set out to do.
And now we’re back where we started – at a publishing-vs-disclosure crossroads. The issue remains unpatched by Microsoft at this writing. As per our disclosure policy, we reserve the right to publish full details at any time now that the 120-day window has closed, but we believe it’s in the best interests of the ecosystem at large to wait a bit longer. The publications linked above provide some useful clues to the knowledgeable reader, and we encourage you to take a closer look at those posts.
Beyond that, watch this space. And you can also watch our own Art Gilliland, senior VP and general manager of the Enterprise Software Group (our part of the HP universe), who has more to say about it:
The team emphasizes that Microsoft’s recent work on mitigations is incredibly important – not merely for the security of individual users but for the safety of people and entities on and off the Internet. That’s why it was important to investigate it and to make our findings known, says Simon: “I'm hopeful that our contribution to research in this field will further the process towards creating secure browser technology.”
And the money?
Meanwhile, there’s all that Microsoft money on the way. We at HPSR are proud of Brian, AbdulAziz, and Simon, but as employees of HP they don’t get to keep the cash. Instead, each was invited to choose a charity to which we’ll donate a portion of the reward. Each selected an educational organization with a strong STEM (science, technology, engineering, math) emphasis. We are pleased to announce that Texas A&M University, Concordia University, and Khan Academy will each receive a third of the bounty.
While Texas A&M and Concordia are both well-respected for their college-level information security programs, the online-only Khan Academy may not be familiar to everyone – at least not as a STEM contender. Simon disagrees. “I find it to be an incredibly exciting project,” he says. “It's fantastic how they're creating a free and comprehensive resource for education in math, science and other subjects for learners of all ages.” We couldn’t agree more.
We believe that excellent, principled security research benefits the entire ecosystem. Sometimes – as with this $125,000 payout, or with the $80,000 Pwn4Fun event at last year’s Pwn2Own – HP Security Research can create additional good in the world through our actions. The Zero Day Initiative and Microsoft have worked together for nearly ten years to make the Internet safer, bringing vulnerabilities to the attention of the people who are best suited to fix them. When that disclosure process is coordinated smoothly among researchers, bounty programs, and companies, we keep safety and research ethics high and drama low – and, sometimes, get the cash flowing to good causes.
-
bounty
-
mitigation bypass
-
ZDI
-
Zero Day Initiative
- Back to Blog
- Newer Article
- Older Article
- Back to Blog
- Newer Article
- Older Article
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Email to a Friend
- Printer Friendly Page
- Report Inappropriate Content
- on: Analytics in security
- on: Subtle shift in Microsoft’s patching policy could have wide-reaching effect
- on: There and back again: a journey through bounty award and disclosure
- on: HP Security Briefing, Episode 22: The hidden dangers of inadequate patching strategies
- SasiSiddharth on: Analyzing CVE-2015-1635 from cause to cure
- on: Crypto Manifesto 2015
- on: Full details on CVE-2015-0096 and the failed MS10-046 Stuxnet fix
- on: HPSR, Microsoft, disclosure, and the $125,000 bug bounty
- on: Life after Windows Server 2003: Ready or not, here it comes
- on: POS malware - a look at Dexter and Decebal
-
0day
4 -
abap
1 -
access control
1 -
adobe
2 -
Altcoin
2 -
Android
1 -
antivirus
1 -
apache struts
2 -
Apple
1 -
Application security
1 -
appsec
1 -
April Fools
4 -
ArcSight Application View
1 -
Articles of interest
13 -
ASLR
1 -
Autonomy
1 -
Big Data
1 -
Bitcoin
4 -
Bitcoin ATM
1 -
Bitcoin Mining
1 -
bitcoinATM
1 -
Black Hat
3 -
bounty
3 -
CanSecWest
2 -
CESG
1 -
chrome
1 -
computer security
4 -
conferences
1 -
crashes
1 -
credit card
1 -
Cryptocurrency
4 -
cryptography
2 -
CVE-2015-1635
1 -
cyber risk report
1 -
cybercrime
2 -
database
1 -
debugging
1 -
Denial of Service
1 -
DEP
1 -
Disclosure policy
1 -
django
1 -
DNS
1 -
drones
1 -
DVLabs
5 -
dynamic analysis
1 -
Dynamic Application Security Testing
1 -
Dynamic Web Application Security Testing
2 -
emet
1 -
Engineering
1 -
Enterprise security
1 -
exploit
17 -
exploits
2 -
FalseConnect
1 -
Field
1 -
Firefox
1 -
firmware
1 -
flash
1 -
Fortify
3 -
Fortify Runtime
1 -
Fortify SCA
1 -
FREAK
1 -
galaxy
1 -
Google
1 -
GPS
1 -
heartbleed
1 -
HP
14 -
HP Application Defender
5 -
HP Atalla
1 -
HP Fortify
4 -
HP Fortify SCA
2 -
HP SecureBase
2 -
HP Security Research
2 -
HP Voltage
1 -
HP WebInspect
7 -
HPE Security Research
41 -
HPSR
114 -
HTTP.sys
1 -
ibatis
1 -
IE
2 -
IE0day
1 -
IIS
1 -
Infographic
1 -
Integer Overflow
1 -
Internet Explorer
1 -
Internet of Things
1 -
Intrusion prevention system IPS
1 -
iOS
2 -
IoT
1 -
Java
1 -
Languages
1 -
LDAP
1 -
lists
1 -
localhost
1 -
Maltese
1 -
Malware
7 -
MemoryProtection
1 -
Microsoft
2 -
Microsoft Windows
1 -
mitigation bypass
2 -
Mobile
11 -
monthly patch review
2 -
MS15-034
1 -
mybatis
1 -
Network security
1 -
next-generation firewall NGFW
1 -
Nexus
1 -
NGFW
1 -
north korea
1 -
NSA
1 -
o-day
1 -
open source
1 -
openssl
1 -
OpSec
2 -
Oracle
1 -
orm
1 -
OSINT
9 -
OWASP
1 -
OWASP AppSec USA
1 -
Patch Tuesday
1 -
patches
4 -
POODLE
1 -
Privacy
3 -
proxy authentication
1 -
pwn2own
29 -
pwn4fun
1 -
python
3 -
Remote code Exection
1 -
Research
15 -
Reserach
1 -
reverse engineering
1 -
RFD
1 -
RISCS
1 -
risk report
1 -
RSA
1 -
ruby
1 -
rulepack
1 -
Safari
2 -
Samsung
3 -
sandboxbypass
1 -
SAP
1 -
SCA
1 -
SecOps
2 -
Security
44 -
security analytics
1 -
security conference
1 -
security intelligence
2 -
Security Research
14 -
security tools
1 -
seven pernicious kingdoms
2 -
SIEM
2 -
SOC
2 -
software security
2 -
Software Security Research
1 -
sony
1 -
sourceanalyzer
1 -
speaking
1 -
spoofing
1 -
Spring
1 -
SQL Injection
1 -
SSC
1 -
SSR
10 -
static analysis
3 -
static analyzer
1 -
Struts1
1 -
Struts2
1 -
stuxnet
3 -
threat briefing
2 -
threat briefings
1 -
Threat intelligence
9 -
threat modeling
2 -
threatbriefings
21 -
threatmodeling
2 -
TippingPoint
4 -
tools
2 -
Training
1 -
trojan
1 -
UAF
1 -
unicorn
1 -
Vertica
1 -
Virus Bulletin
1 -
vulnerabilities
7 -
Vulnerability
10 -
vulnerability analysis
1 -
vulnerability research
1 -
Web Framework Vulnerabilities
1 -
WebInspect
2 -
Windows Server 2003
1 -
ZDI
43 -
ZDI@10
2 -
Zero Day
1 -
Zero Day Initiative
14