Microsoft explains how it missed critical IE bug

Developers missed a critical bug in Internet Explorer because they weren't properly trained and didn't have the right testing tools, an insider reveals.

Microsoft's developers missed a critical bug in Internet Explorer because they weren't properly trained and didn't have the right testing tools, a noted proponent of the company's secure code development process acknowledged last week.

The bug, which Microsoft patched last week with an emergency update, had gone undetected for at least nine years.

In an insider's description on Microsoft's Security Development Lifecycle blog, Michael Howard, a principal security program manager with the company, offered a postmortem analysis of the IE vulnerability and Microsoft's code-writing and reviewing process.

Howard, who is perhaps best known for co-authoring the book Writing Secure Code , said the flaw was a "time-of-check-time-of-use" bug in how IE releases data binding objects.

The vulnerability was not found by programmers because they had not been told or taught to look for them in such cases, Howard said. "Memory-related [time-of-check-time-of-use, or TOCTOU] bugs are hard to find through code review," he said. "We teach TOCTOU issues, and we teach memory corruption issues, and issues with using freed memory blocks; but we do not teach memory-related TOCTOU issues."

Microsoft's testing tools -- including "fuzzers," automated tools that drop data into applications, file formats or operating system components to see if, and where, they fail -- also missed the bug, Howard admitted.

"In theory, fuzz testing could find this bug, but today there is no fuzz test case for this code," he said. "Triggering the bug would require a fuzzing tool that builds data streams with multiple data binding constructs with the same identifier. Random (or dumb) fuzzing payloads of this data type would probably not trigger the bug, however."

Howard said that Microsoft would update its developer training to account for memory-related TOCTOU bugs like this one.

Several parts of Windows' security toolkit didn't help protect users from exploits of this bug, Howard added, including ALSR and NX, technologies available only in Windows Vista and Windows Server 2008. "Even though Windows Vista and Windows Server 2008 have both ASLR and NX enabled by default, Internet Explorer 7 does not opt-in to these defenses owing to compatibility issues with many common applications," Howard noted.

Before Microsoft released last week's patch and after it had confirmed that attacks were in progress, it urged users to take countermeasures, including enabling DEP (data execution prevention), another term for NX, in IE7.

Another Microsoft defense, however, did protect users running Vista or Server 2008, said Howard, who argued that "Protected Mode" did its job. Protect Mode essentially "sandboxes" IE and its add-ons so that actions taken within the browser are prevented from accessing the operating system generally.

"When the exploit code runs, it's running at low integrity because IE runs at low integrity," Howard said, "and this means the exploit code cannot write to higher integrity portions of the operating system, which is just about everywhere."

Those defensive technologies could not protect users of Window XP, which remains the most widely used version of Windows by a margin of more than 3:1 over Vista.

Howard also speculated that the bug may have been found by hackers armed with custom fuzzers, which Microsoft itself has not crafted for its own testing.

"I think this bug is a great example of 'you will never get the code 100% right, so multiple defenses are critical'," Howard said. "[And] if there is one other lesson from this, it's that we, the software industry, need to work harder to make sure applications take advantage of the defenses offered in Windows today."

The data binding bug was present in all still-supported versions of IE, including IE5.01, which was released in November 1999. The patch can be downloaded and installed via the Microsoft Update and Windows Update services, as well as through Windows Server Update Services.

Tags MicrosoftInternet Explorer

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld (US)

Comments

Comments are now closed.

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?