Security firm discloses vulnerabilities to vendors who are willing to pay
Posted on 07 July 2010.
VUPEN Security has had enough - no more freebies for software vendors. The security company - previously known as FrSIRT (French Security Incident Response Team) - decided to share their discoveries of vulnerabilities only with those who are ready to pay.

According to a post on their official site, they have recently discovered two vulnerabilities in Office 2010 (affecting Word and Excel) and have created a code execution exploit which works with Office 2010 and bypasses DEP and Office File Validation features.

"Technical details of this memory corruption flaw affecting Excel will not be publicly disclosed, however, our Gov customers who are members of the VUPEN Threat Protection Program have access to the full binary analysis of the vulnerability and a detection guidance to proactively protect their critical infrastructures and networks against this potential threat," says in the post.

And this "private responsible disclosure policy" is here to stay, as VUPEN CEO Chaouki Bekrar revealed to The H Security. That means that details of the flaw won't be published until the patch is out, but it also means that if Microsoft wants to know the details, it will have to pay for the information.

It goes without saying that details about use-after-free vulnerability in MS Internet Explorer that VUPEN has announced to have discovered yesterday will also be off-limits to those who aren't prepared to financially remunerate the researchers' efforts. For, as Bekrar says, "why should security services providers give away for free information aimed at making paid-for software more secure?"


The Internet of Things is unavoidable, securing it should be a priority

The Internet of Things (IoT) started like any other buzzword: poorly defined, used too often, and generally misunderstood. However, it stood the test of time and is now increasingly becoming part of everyday language, even with those outside the IT world.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Mon, Jul 27th