A Chinese security firm was named responsible for the leak of Remote Desktop Protocol (RDP) exploit code and has been booted from Microsoft's vulnerability-sharing program.
Hangzhou DPTech Technologies Co, a specialist in firewalls and intrusion prevention systems, breached its non-disclosure contract with the Microsoft Active Protections Program (MAPP) by leaking the dangerous code.
Under MAPP, Microsoft shares vulnerability details with approved software security providers prior to its monthly fixes being released to allow security firms to immediately protect their customers once the patches are delivered.
Specifically MAPP provides its partners with a comprehensive explanation of the vulnerability, a blueprint to trigger the flaw, information on how to detect the bug and a proof-of-concept file.
The vulnerability in question, a "wormable" weakness in the Windows RDP, was discovered in May 2011 by researcher Luigi Auriemma, who reported his find to TippingPoint's Zero Day Initiative (ZDI) bug bounty service.
It was handed in August to Microsoft to develop a fix.
In March, Microsoft released a patch that came with a warning that the software giant expected to see a code-execution exploit released within 30 days.
It took about two days for a proof-of concept (PoC) to appear on a Chinese hacker site. No known remote exploit has been released.
Upon investigation, Auriemma discovered many similarities between the published PoC and the one that he sent ZDI so the service could test the vulnerability.
As further proof, the posted code appeared modelled after the PoC that Microsoft developed in November for internal tests, and which, he concluded, was likely distributed to partners as part of the MAPP.
"[The PoC published on the Chinese site] contains some debugging strings like 'MSRC11678' which is a clear reference to the Microsoft Security Response Center," Auriemma said.
Based on the evidence, Auriemma determined that those responsible for creating the publicly available PoC were the beneficiaries of a leak.
As it turned out, he was right. Now, Microsoft plans to tighten the security controls around the MAPP, though it wouldn't elaborate.
MAPP team manager Maarten Van Horenbeeck said Microsoft took careful steps to ensure incidents like this rarely occurred.
"We recognise that there is the potential for vulnerability information to be misused," he said.
"In order to limit this as much as possible, we have strong non-disclosure agreements (NDA) with our partners. Microsoft takes breaches of its NDAs very seriously. In addition, we make sure to only release data shortly in advance of the security update.
"Today, we send MAPP data to our partners just as far in advance as they need to get that work done."
A Microsoft spokeswoman could not immediately be reached for comment. An email sent to DPTech for comment was not immediately returned.
This article originally appeared at scmagazineus.com
Copyright © SC Magazine, US edition
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @itnews.com.au to your white-listed senders.