According to a post on their official site, they have recently discovered two vulnerabilities in Office 2010 (affecting Word and Excel) and have created a code execution exploit which works with Office 2010 and bypasses DEP and Office File Validation features.
"Technical details of this memory corruption flaw affecting Excel will not be publicly disclosed, however, our Gov customers who are members of the VUPEN Threat Protection Program have access to the full binary analysis of the vulnerability and a detection guidance to proactively protect their critical infrastructures and networks against this potential threat," says in the post.
And this "private responsible disclosure policy" is here to stay, as VUPEN CEO Chaouki Bekrar revealed to The H Security. That means that details of the flaw won't be published until the patch is out, but it also means that if Microsoft wants to know the details, it will have to pay for the information.
It goes without saying that details about use-after-free vulnerability in MS Internet Explorer that VUPEN has announced to have discovered yesterday will also be off-limits to those who aren't prepared to financially remunerate the researchers' efforts. For, as Bekrar says, "why should security services providers give away for free information aimed at making paid-for software more secure?"
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.