Closed GoogleCodeExporter closed 9 years ago
Also, the way you assume your few dozen reports are the ONLY thing that
Microsoft needs to handle at any given moment. Well, guess what, they have
millions of other things to do as well (just like YOU), so no, 90 days may not
necessarily be enough just because you decide it is, according to YOUR
standards, YOUR processes and YOUR schedules.
Original comment by gradin...@outlook.com
on 14 Jan 2015 at 9:51
Well,it's is paying for support that is promised by MS, and I expect them to
fulfill their duties. I am happy about every exploit that is discovered in any
software so the manufacturer can fix it in order that nobody will be able to
use the exploit in secret.
And for a crucial system component like an OS I expect the manufacturer - that
is Microsoft in here - to react to those exploits as fast as possible. I pay
for the system, entire production facilities depend upon this OS, so
yes,IMHO I am in the position to demand from Microsoft to fix exploits with
highest priority.
Original comment by michael....@googlemail.com
on 14 Jan 2015 at 10:32
I believe what Google doing is right in long term:
1. 90 days is enough time to make a patch: MS argues Google should wait until
MS release patch. What if it's not ready on the day? Google should wait another
month? It's MS's responsibility to patch ASAP; They are not supposed to ask
Google to hold the information disclosure. I would say Google can wait if it
would not happen again, but this may bring up same situation again and again.
At the end, customer would be the one who will take disadvantage using the
vulnerable software.
2. I believe Google apply all rules to all company depends on vulnerability
risk level. If it cause more issues to MS, that means MS has some issues on
their end:
a. MS might have more vulnerabilities on their software
OR
b. they don't have good enough system to fix vulnerabilities in time. If MS don't have good enough system to handle this situation, is MS good enough company to lead the computer industry? MS complains Google was pushing the risk to customer. But on the other hand, MS is taking customers as hostage to claim 'easy deadline' for MS. Is it really right thing?
Original comment by armiantc@gmail.com
on 15 Jan 2015 at 4:33
[deleted comment]
And its gone. Tried it today Windows 8.1U1 no dice.
Original comment by pslov...@gmail.com
on 24 Jan 2015 at 2:01
Really awesome!
Original comment by hanyaan...@gmail.com
on 25 Jan 2015 at 2:52
[deleted comment]
[deleted comment]
Adding PoC for getting local system on 32 bit Windows 8.1 update.
Original comment by fors...@google.com
on 9 Feb 2015 at 6:58
Attachments:
[deleted comment]
Hello ,
Two weeks ago I was able to locate some binary/executable in protected
directory on windows 8.1 machine,i used a technique to span cmd shell
instead of that binary, since the binary runs with NT Authority
/Network service privilege and in service session I was unable to
interact with it ,I changed my hack and used netcat in my plan and I
was able to interact with the cmd shell in user session, now I get
privilege escalation from user/guest does it count ?
Original comment by Mudasir...@gmail.com
on 8 Mar 2015 at 5:44
This is really fantastic it will create security awareness and Let us know what
we have to do in order to mitigate these RCE besides it will give a massive
boost to windows security researchers, Awesome ....Thanks
Original comment by Mudasir...@gmail.com
on 8 Mar 2015 at 5:56
Original issue reported on code.google.com by
fors...@google.com
on 30 Sep 2014 at 2:17Attachments: