BLACK HAT: Microsoft to work with third parties over vulns

Share this article:
Microsoft announced Thursday that it plans to work with third-party software providers to find and fix security vulnerabilities.

The Microsoft Vulnerability Research (MSVR) program, announced at the Black Hat conference in Las Vegas, will analyze software bugs in third-party products -- for example, Adobe Reader -- that are commonly used by Windows customers.

"While the source of the vulnerabilities will usually come from original research at Microsoft, the program will also handle third-party vulnerability coordination for blended threats reported to us by responsible researchers," Kate Moussouris, a Microsoft security strategist, wrote in a blog post.

In the past, Microsoft discovered third-party bugs more or less by chance but now the company plans to specifically look for flawed software, she said.

"The MSVR program will formalize the company's responsible disclosure efforts of working directly with affected vendors, confidentially providing them specific vulnerability information and helping them to create updates," Moussouris said.

Andrew Storms, director of security operations at network security firm nCircle, told SCMagazineUS.com at the show that the program makes sense, considering many researchers errantly report bug finds in third-party applications to Microsoft because the vector of exploit is often a Windows component, such as Internet Explorer.

The news follows two other announcements for Microsoft aimed at helping end-users more effectively patch their systems.
Share this article:

Sign up to our newsletters

More in News

Research shows vulnerabilities go unfixed longer in ASP

Research shows vulnerabilities go unfixed longer in ASP

A new report finds little difference in the number of vulnerabilities among programming languages, but remediation times vary widely.

Bill would restrict Calif. retailers from storing certain payment data

The bill would ban businesses from storing sensitive payment data, for any long than required, even if it is encrypted.

Amplification, reflection DDoS attacks increase 35 percent in Q1 2014

Amplification, reflection DDoS attacks increase 35 percent in ...

The Q1 2014 Global DDoS Attack Report reveals that amplification and reflection distributed denial-of-service attacks are on the rise.