Feeds

eBay pulls Excel vulnerability auction

Spoilsports

The Power of One eBook: Top reasons to choose HP BladeSystem

Online auction giant eBay shut down the bidding for a vulnerability in Microsoft's Excel spreadsheet program on Thursday, saying that the sale of flaw research violates the site's policy against encouraging illegal activity.

The vulnerability, which could allow a malicious programmer to create an Excel file that could take control of a Windows computer when opened, appears to be real. Members of the Microsoft Security Response Center (MSRC) are investigating the vulnerability report, a spokesperson for the software giant said Thursday night. eBay pulled the auction after Microsoft complained to the company's Trust and Safety Team, said Catherine England, spokeswoman for the online auctioneer.

"The listing was immediately reviewed and pulled from the site for violating our policy against promoting illegal activity - hacking," England said in an email to SecurityFocus. "In general, research can be sold as a product. However, if the research were to violate the law or intellectual property rights then it would not be allowed."

The online auction company "prohibits the sale of items or links to items that encourage, promote, facilitate or instruct others to engage in illegal activity," according to its stated policy.

The move comes as the idea of selling vulnerability research has gained more traction amongst the security industry and research communities. Buying flaw information is a controversial practice, but one currently supported by at least two security companies: iDefense and 3Com's TippingPoint. Both companies have created initiatives aimed at procuring original vulnerability research from independent flaw finders.

Software makers tend to frown upon such tactics because the exposure of vulnerabilities in their product can significantly undermine trust in their product and even their stock evaluations. Microsoft typically will criticize researchers who publicly disclose flaws before giving the company adequate time, typically at least 30 days and frequently many months, to fix the problem.

The person trying to sell the alleged flaw in Excel, identified only by his eBay nickname "fearwall," laced his description of the flaw with barbs aimed at Microsoft.

"Since I was unable to find any use for this by-product of Microsoft developers, it is now available for you at the low starting price of $0.01 -a fair value estimation for any Microsoft product," the seller stated in the description of his auction. Attempts to contact the seller have so far been unsuccessful.

Turning to auctions to maximize a security researcher's profits and fairly value security research is also not a new idea. Two years ago, security expert Greg Hoglund had reserved the domain "zerobay.com" and intended to create an auction site, but worries over liability caused him to scuttle the plan a few days before the site went live, he said.

"I discussed the idea a lot with other people in the community," said Hoglund, who is now the CEO of reverse engineering firm HBGary. "Generally, people thought the idea would be the best way to sell that sort of material."

The problem with the current market for vulnerabilities is that security researchers are generally poorly paid for the amount of work that they have to invest in finding flaws, he said. Knowledgeable researchers, which might otherwise charge $100 or more an hour for their work, can spend weeks searching for security problems, Hoglund said.

"Companies have this expectation that this information should be provided to them for free," he said. "And that's not fair, because these people are highly skilled labor."

Microsoft will continue to analyze the flaw and will provide a patch, if necessary, the software giant's spokesperson said.

Copyright © 2005, SecurityFocus

This article was originally published in SecurityFocus

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.