SHARE
Facebook X Pinterest WhatsApp

XP SP2 Flaw Warning Sparks Debate on Disclosure

The debate over responsible disclosure of security flaw warnings has erupted again, with Microsoft chiding a private research firm for releasing information on 10 new flaws found in the Windows XP SP2 (Service Pack 2) operating system. San Jose, Calif.-based Finjan Software released an alert warning that attackers could “silently and remotely” hijack SP2 machines […]

Written By
thumbnail Ryan Naraine
Ryan Naraine
Nov 11, 2004
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

The debate over responsible disclosure of security flaw warnings has erupted again, with Microsoft chiding a private research firm for releasing information on 10 new flaws found in the Windows XP SP2 (Service Pack 2) operating system.

San Jose, Calif.-based Finjan Software released an alert warning that attackers could “silently and remotely” hijack SP2 machines because of “major flaws” that compromise end-user security.

Finjan chief executive Shlomo Touboul told eWEEK.com that full technical details of the vulnerabilities—including proof-of-concept code—were given to Microsoft, but the software giant reacted sharply by suggesting that the Finjan warning is overblown.

“Our early analysis indicates that Finjan’s claims are potentially misleading and possibly erroneous regarding the breadth and severity of the alleged vulnerabilities in Windows XP SP2,” a Microsoft spokesperson said.

“Once Microsoft concludes investigating Finjan’s claims and if Microsoft finds any valid vulnerability in Windows XP SP2, it will take immediate and appropriate action to help protect customers,” she added.

According to Finjan, the flaws are so serious that XP SP2 users are at risk if they simply browse a Web page. The holes also could be exploited to allow malicious hackers to remotely access users’ local files or to switch between Internet Explorer Security Zones to obtain rights of local zone.

The research outfit also claims that it discovered a bug in the notification mechanism built into XP SP2 to warn users when executable files are being downloaded. Finjan claims it has already proven to Microsoft that hackers can bypass the mechanism to inject arbitrary code without any warning or notification.

When told that Microsoft was discounting the severity of his company’s claims, Finjan’s Touboul lashed back: “These are not theoretical assumptions. These findings are based on code implementing each and every one of those 10 vulnerabilities.”

Microsoft said it would continue investigating Finjan’s claims to confirm valid vulnerability claims before rolling out possible fixes.

“[We encourage] Finjan to abide by the principles of responsible disclosure and to decline to provide further comment or details on the alleged vulnerabilities until Microsoft is able to complete its investigation and can respond properly to protect customers,” the spokesperson said.

Next Page: Cooperation between independent researchers and software vendors.

The back-and-forth between Microsoft and Finjan highlights the need for an acceptable protocol for cooperation between independent researchers and software vendors, said Gerhard Eschelbeck, chief technology officer of vulnerability management consulting firm Qualys.

“I’m a big supporter of disclosing the required information at the appropriate time, and that’s usually when a patch is available. In this case, you have to question the spirit of releasing information when the vendor is still doing investigations,” Eschelbeck said.

Finjan insists that it did nothing out of the ordinary. “We provided full disclosure and technical details only to the vendor. No technical details or proof-of-concept code are ever published. The information we put out is basic in nature to help people to protect themselves,” Touboul said.

Rick Fleming, chief technology officer of Texas-based Digital Defense Inc., said a good rule of thumb is to give a vendor 30 to 60 days to create and test software patches before releasing information.

“In a perfect world, the two sides should work together on a patch and coordinate the release of information when the fix is ready. That happens in many cases, but unfortunately, like in this case, it’s still a problem,” Fleming said.

Fleming said he believes software vendors also must take some of the blame. “Some vendors drag their feet when security issues are brought to their attention. That’s a fact, and that’s a legitimate gripe among researchers.”

Click here to read about an Internet Explorer exploit that lets attackers plant programs on SP2.

In many cases, independent flaw finders work only for the recognition of their peers, and they revel in the publicity generated from finding significant vulnerabilities. “There is competition among security researchers. Being able to say ‘I’ve looked at SP2 and found a serious file-handling problem that presents a major risk’ is a big deal for a researcher,” Fleming said.

Qualys CTO Eschelbeck said a big disconnect happens when distrust exists between a researcher and a vendor. “At the end of the day, responsible disclosure should always be in the interest of the end-user. If any element of disclosure puts the end-user at risk, that’s irresponsible.”

Marty Lindner, team leader for incident handling at the federally funded CERT Coordination Center (CERT/CC), said he believes the vulnerability disclosure problem is exacerbated by the fact that research firms all have different policies.

“It becomes a philosophical question. On one extreme, you have the guys who favor full disclosure, against those who don’t want to tell anyone anything, and that’s the other extreme.”

Lindner said CERT/CC publishes its disclosure policy to publicly highlight the way flaw warnings are handled. It calls for all reported vulnerabilities to be disclosed to the public 45 days after the initial report, regardless of the existence or availability of patches or workarounds from affected vendors.

“Extenuating circumstances, such as active exploitation, threats of an especially serious (or trivial) nature, or situations that require changes to an established standard may result in earlier or later disclosure,” according to the CERT/CC vulnerability disclosure policy.

Lindner said affected vendors are notified of the center’s publication plans and, in some cases, alternate publication schedules with the affected vendors are negotiated.

Check out eWEEK.com’s for Microsoft and Windows news, views and analysis.

Recommended for you...

Scale Computing Makes Strategic Updates to HyperCore Solution
Jordan Smith
Sep 17, 2025
Druva Launches Metadata Graphing & New Agentic AI Solutions
Jordan Smith
Sep 17, 2025
SonicWall’s Michael Crean on State of Managed Security
Victoria Durgin
Sep 17, 2025
Gigamon Unveils Agentic AI App to Boost IT Productivity
Luis Millares
Sep 16, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.