Google goes public with more Windows bugs

Google this week publicized two new disclosures of Windows vulnerabilities before Microsoft was able to patch them, the third and fourth times it's done so in 17 days.

Google has let fly two new disclosures of Windows vulnerabilities before Microsoft was able to patch them, marking the third and fourth times it's done so in the past 17 days.

The bugs were revealed Wednesday and Thursday on Google's Project Zero tracker.

The more serious of the two allows an attacker to impersonate an authorized user, and then decrypt or encrypt data on a Windows 7 or Windows 8.1 device.

Google reported that bug to Microsoft on October 17, 2014, and made some background information and a proof-of-concept exploit public on Thursday.

Project Zero is composed of several Google security engineers who investigate not only the company's own software, but that of other vendors as well. After reporting a flaw, Project Zero starts a 90-day clock, then automatically publicly posts details and sample attack code if the bug has not been patched.

The team's previous disclosures of Windows bugs -- one on December 29, 2014, the second on January 11, 2015 -- led Microsoft to blast Google for putting its Windows customers at risk because neither vulnerability had been patched by the deadlines.

Microsoft fixed those flaws on Tuesday.

In the bug tracker for the impersonation vulnerability, Google said it had queried Microsoft on Wednesday, asking when the flaw would be patched and reminding its rival that the 90 days were about to expire.

"Microsoft informed us that a fix was planned for the January patches but [had] to be pulled due to compatibility issues," the bug tracker stated. "Therefore the fix is now expected in the February patches."

The next Patch Tuesday is scheduled for February 10.

The other issue had been disclosed Wednesday and could let an unauthorized user retrieve information about a Windows 7 PC's power settings. Even Google wasn't sure it was a security problem, however.

"It isn't clear if this has a serious security impact or not, therefore it's being disclosed as is," that bug's listing read.

Both disclosures, like the earlier pair, resulted from work by Google security engineer James Forshaw.

Microsoft confirmed the revealed-on-Thursday vulnerability.

"We're working to address the first case, CryptProtectMemory bypass," said a Microsoft spokesman in an email late Thursday. "We are not planning on addressing the second case, which may allow access to information about power settings, in a security bulletin."

Microsoft told Project Zero that it may deal with the power settings problem with a later, non-security fix. "Microsoft [has] stated that this issue is not considered serious enough for a bulletin release as it only allows limited information disclosure about power settings. It will be under consideration for fixing in future versions of Windows," the tracker said. "We agree with this assessment."

The spokesman added that Microsoft has seen no evidence of in-the-wild attacks leveraging the impersonation vulnerability. "To successfully exploit this, a would-be attacker would need to use another vulnerability first," the spokesman added.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Follow our new CSO Australia LinkedIn
Follow our new social and we'll keep you in the loop for exclusive events and all things security!
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

Tags MicrosoftGoogleoperating systemssoftwareWindowsantispamMalware & Vulnerabilities

More about GoogleMicrosoft

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Brand Page

Stories by Gregg Keizer

Latest Videos

More videos

Blog Posts