Home arrow Microsoft
Microsoft Security Response Center
  • May 2015 Updates

    Today, as part of Update Tuesday, we released 13 security bulletins.

    We encourage customers to apply all of these updates. For more information about this month’s security updates, including a detailed view of the Exploitability Index (XI), visit the Microsoft Bulletin Summary webpage. If you are not familiar with how we calculate the XI, a full description can be found here.

    We also released one new Security Advisory:

    One Security Advisory was revised:

    For the latest information, you can follow the Microsoft Security Response Center (MSRC) team on Twitter at @MSFTSecResponse.

    MSRC Team



  • Microsoft Bounty Programs Expansion – Azure and Project Spartan

    I am excited to announce significant expansions to the Microsoft Bounty Programs.  We are evolving the 'Online Services Bug Bounty, launching a new bounty for Project Spartan, and updating the Mitigation Bypass Bounty.

    This continued evolution includes additions to the Online Services Bug Bounty Program

    • Azure
      • Azure is Microsoft’s cloud platform and the backbone of Microsoft cloud services.
      • This program will include a number of Azure services, such as: Azure virtual machines, Azure Cloud Services, Azure Storage, Azure Active Directory and much more
    • Sway.com
      • Sway.com is a web application that lets users express ideas in an entirely new way across many devices and platforms
    • Raising the maximum payout for the Online Services Bounty Program
      • We will pay up to $15,000 USD for critical bugs, as always, more for more impactful and better documented bugs.

    We’re also launching a new bounty related to the Windows 10 Technical Preview:

    • Project Spartan Bug Bounty
      • Microsoft’s new browser will be the onramp to the internet for millions of users when Windows 10 launches later this year.  Securing this platform is a top priority for the browser team.
      • This bounty includes Remote Code Execution and Sandbox Escapes, as well as design-level security bugs.
        • Always be sure to use the latest version released in the Windows 10 Technical Preview
      • Microsoft will pay up to $15,000 USD for security vulnerabilities reported in Project Spartan, you can see the specifics in the program terms. Don’t hesitate as the Project Spartan Bug Bounty will run from April 22, 2015 to June 22, 2015
        • The bounties for Spartan are tiered by the criticality of the issue reported, as well as the quality of the documentation and how reproducible the issue is.

    The Mitigation Bypass bounty and the Bonus bounty for Defense are both very active, paying up to $100,000 USD for novel methods to bypass active mitigations (e.g. ASLR and DEP) in our latest released version of operating system (currently Windows 8.1 and Server 2012 R2) and a bonus of up to $50,000 USD for actionable defense techniques to the reported bypass.  We have one addition to the Mitigation bypass bounty:

    • Hyper-V escape
      • Guest-to-Host
      • Guest-to-Guest
      • Guest-to-Host DoS (non-distributed, from a single guest)

    These important additions to the Bounty Programs reflect the continued shift and evolution of technology towards the cloud.  The additions to the bounty program will be part of the rigorous security programs at Microsoft.  They will be worked alongside the Security Development Lifecycle (SDL), Operational Security Assurance (OSA) framework, regular penetration testing of our products and services and Security and Compliance Accreditations by third party audits.

    Microsoft has a long history of working closely with security researchers.  Having personally done penetration testing and exploit mitigation, I understand that this is intense and difficult work.  I can say that we truly value these contributions.  Bug bounties are an increasingly important part of the vulnerability research and defense ecosystem and will continue to evolve over time.  We will be regularly managing the Microsoft Bounty Programs to help us best protect our many users.

    Mark Russinovich will be sharing some information in his “Assume Breach: An Inside Look at Cloud Service Provider Security” talk.  You can also come by the Microsoft Booth at RSA on April 23, 2PM for a Bounty Program Q&A or you can always find the most up to date information about our bounty programs at https://aka.ms/BugBounty and in the associated terms and FAQs. 

    I’m looking forward to seeing some great submissions!

    Jason Shirk



  • April 2015 Updates

    Today, as part of Update Tuesday, we released 11 security bulletins.

    We encourage customers to apply all of these updates. For more information about this month’s security updates, including the detailed view of the Exploitability Index (XI), visit the Microsoft Bulletin Summary webpage. If you are not familiar with how we calculate the XI, a full description can be found here.

    We released one new Security Advisory:

    One Security Advisory was revised:

    For the latest information, you can follow the Microsoft Security Response Center (MSRC) team on Twitter at @MSFTSecResponse.

    MSRC Team



  • March 2015 Updates

    Today, as part of Update Tuesday, we released 14 security bulletins to address vulnerabilities in Microsoft Windows, Microsoft Office, Microsoft Exchange, and Internet Explorer.

    We encourage customers to apply all of these updates. For more information about this month’s security updates, including the detailed view of the Exploitability Index (XI) broken down by each Common Vulnerabilities and Exposures (CVE), visit the Microsoft Bulletin Summary webpage. If you are not familiar with how we calculate the XI, a full description can be found here.

    We released one new Security Advisory:

    Two Security Advisories were revised:

    For the latest information, you can follow the Microsoft Security Response Center (MSRC) team on Twitter at @MSFTSecResponse.

    MSRC Team



  • Security Advisory 3046015 released

    Today, we released Security Advisory 3046015 to provide guidance to customers in response to the SSL/TLS issue referred to by researchers as “FREAK” (Factoring attack on RSA-EXPORT Keys).

    Our investigation continues and we’ll take the necessary steps to protect our customers.

    MSRC Team



  • February 2015 Updates

    Today, as part of Update Tuesday, we released nine security bulletins – three rated Critical and six rated Important in severity, to address 56 unique Common Vulnerabilities and Exposures (CVEs) in Microsoft Windows, Microsoft Office, Internet Explorer, and Microsoft Server software. 

    We encourage you to apply all of these updates. For more information about this month’s security updates, including the detailed view of the Exploitability Index (XI) broken down by each CVE, visit the Microsoft Bulletin Summary webpage. If you are not familiar with how we calculate the XI, a full description can be found here.

    We re-released one Security Bulletin:

    One new Security Advisory was released:

    One Security Advisory was revised:

    We also announced changes related to SSL 3.0 and you can read more about these on the IE blog.

    For the latest information, you can follow the Microsoft Security Response Center (MSRC) team on Twitter at @MSFTSecResponse.

    MSRC Team



  • January 2015 Updates

    Today, as part of Update Tuesday, we released eight security updates – one rated Critical and seven rated Important in severity, to address eight unique Common Vulnerabilities and Exposures (CVEs) in Microsoft Windows.

    We encourage you to apply all of these updates. For more information about this month’s security updates, including the detailed view of the Exploit Index (XI) broken down by each CVE, visit the Microsoft Bulletin Summary webpage. If you are not familiar with how we calculate XI, a full description can be found here.

    We re-released one Security Bulletin:

    One Security Advisory was revised:

    For the latest information, you can follow the MSRC team on Twitter at @MSFTSecResponse.

    MSRC Team




Angelo Castigliola     View Photos of Angelo (8)
    Send Angelo a Message
Sec and Sec-Tech Newsletter
Email:





Upcoming Events