A Google researcher has disclosed an unpatched vulnerability in Windows 8.1 after Microsoft didnâ€™t fix the problem within a 90-day window Google gave its competitor.
The disclosure of the bug on Googleâ€™s security research website early this week stirred up a debate about whether outing the vulnerability was appropriate.
The bug allows low-level Windows users to become administrators in some cases, but some posters on the Google site said the company should have kept its mouth shut. Google said it was unclear if versions of the Windows OS earlier than 8.1 were affected by the bug.
â€œAutomatically disclosing this vulnerability when a deadline is reached with absolutely zero context strikes me as incredibly irresponsible and Iâ€™d have expected a greater degree of care and maturity from a company like Google,â€ one poster at the Google site wrote.
The vulnerability is â€œyour averageâ€ local privilege escalation vulnerability, the same poster wrote. â€œThatâ€™s bad and unfortunate, but itâ€™s also a fairly typical class of vulnerability, and not in the same class as those that keep people like me up at night patching servers,â€ the poster said. â€œThe sad reality is that these sort of vulnerabilities are a dime a dozen on Windows.â€
Another poster, in what may be a slight overstatement, suggested the versions of Windows affected are run by â€œbillionsâ€ of computer users. â€œExposing vulnerabilities like this has far reaching consequences,â€ the poster wrote. â€œPeople could get hurt by this and it doesnâ€™t bring anyone closer to a solution. When an organization is as big and powerful as [Google], people working there need to think of themselves as stewards of a great power and work to be fair and regulate the harm that can come of misusing this great power when possible.â€
Was it a secret worth telling?
Other posters praised Google for sticking to a deadline itâ€™s had in place since it launched its Project Zero bug-tracking team last July. â€œNo one is done any good by keeping it secret,â€ one poster wrote. â€œBy exposing the [vulnerability] they allow those billions who may be running vulnerable systems to be aware of the threat to their own security and take countermeasures. A patch isnâ€™t the only way to mitigate the issue. Given the nature of this vulnerability, there are other steps administrators can take to start protecting their vulnerable systems while they await a patch.â€
Microsoft said in a statement it is working to release a security update to the reported vulnerability. â€œIt is important to note that for a would-be attacker to potentially exploit a system, they would first need to have valid logon credentials and be able to log on locally to a targeted machine,â€ a spokesman said by email. â€œWe encourage customers to keep their anti-virus software up to date, install all available security updates and enable the firewall on their computer.â€
Google, in a statement published on Engadget, defended the release of the vulnerability information.
Googleâ€™s 90-day deadline for fixing bug is â€œthe result of many years of careful consideration and industry-wide discussions about vulnerability remediation,â€ the company said. â€œSecurity researchers have been using roughly the same disclosure principles for the past 13 years … and we think that our disclosure principles need to evolve with the changing infosec ecosystem. In other words, as threats change, so should our disclosure policy.â€
Google will monitor the effects of its policy closely, the company added. â€œWe want our decisions here to be data driven, and weâ€™re constantly seeking improvements that will benefit user security,â€ the company added. â€œWeâ€™re happy to say that initial results have shown that the majority of the bugs that we have reported under the disclosure deadline get fixed under deadline, which is a testament to the hard work of the vendors.â€