Incident: Microsoft's Delayed Patch for SSL/TLS Vulnerability in Internet Explorer

Published Date: 2011-12-13

Postmortem Analysis
Timeline 1. The software failure incident happened in December 2011.
System 1. TrueType font handling in the Windows kernel 2. ActiveX Kill Bits 3. Windows Media Player
Responsible Organization 1. The Duqu Trojan exploited a flaw in Microsoft's TrueType font handling in the Windows kernel, leading to the software failure incident [54657].
Impacted Organization 1. Internet Explorer users were impacted by the software failure incident as they were at risk of having their encrypted communications snooped on due to a flaw that was not fixed in time [54657].
Software Causes 1. Exploited flaw in TrueType font handling in the Windows kernel allowing attackers to take control of a machine [54657] 2. Cumulative security update of ActiveX Kill Bits [54657] 3. Flaw in Windows Media Player [54657] 4. Compatibility issue with SAP affecting the fix for a weakness in SSL and TLS encryption protocols [54657]
Non-software Causes 1. Compatibility issue with SAP [54657]
Impacts 1. The software failure incident allowed the Duqu Trojan to exploit a flaw in the TrueType font handling in the Windows kernel, potentially enabling attackers to take control of machines [54657]. 2. Due to the failure to release a fix to protect Internet Explorer users from having their encrypted communications snooped on, there was a delay in safeguarding against potential man-in-the-middle attacks using the BEAST software [54657].
Preventions 1. Implementing the patch for the critical hole in the TrueType font handling in the Windows kernel (MS11-087) that allowed attackers to take control of machines [54657]. 2. Releasing the full fix for the weakness in SSL and TLS encryption protocols used to secure websites accessed using HTTPS, which was postponed due to a compatibility issue with SAP [54657].
Fixes 1. Patching the critical hole in the TrueType font handling in the Windows kernel with MS11-087 [54657]. 2. Applying the cumulative security update of ActiveX Kill Bits with MS11-090 [54657]. 3. Installing the critical update to fix the flaw in Windows Media Player with MS11-092 [54657].
References 1. Microsoft Trustworthy Computing group manager, Jerry Bryant [54657]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to the Microsoft software vulnerabilities and patches mentioned in Article 54657 indicates that similar incidents have happened before or again within the same organization. Microsoft has been consistently releasing security patches to address critical vulnerabilities in its products, such as Windows kernel, ActiveX, and Windows Media Player. The article mentions that Microsoft had initially planned to release a bulletin addressing a weakness in SSL and TLS encryption protocols but had to postpone it due to a compatibility issue with SAP. This shows a recurring pattern of addressing security vulnerabilities within Microsoft's software products. (b) The software failure incident related to the SSL and TLS encryption protocols mentioned in Article 54657 also indicates that similar incidents have happened at other organizations or with their products and services. The article discusses the release of software called BEAST that can decrypt encrypted data streams for a man-in-the-middle attack, highlighting a broader vulnerability in SSL/TLS protocols used to secure websites. This suggests that the issue of vulnerabilities in encryption protocols is not unique to Microsoft but is a concern across various organizations relying on secure communication protocols.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the delay of a fix to protect Internet Explorer users from having their encrypted communications snooped on. Microsoft had initially planned on releasing a bulletin to address a weakness in SSL and TLS encryption protocols used to secure websites, but it was postponed due to a compatibility issue with SAP [54657]. (b) The software failure incident related to the operation phase is evident in the exploitation of a critical hole in the TrueType font handling in the Windows kernel by the Duqu malware. This flaw allowed attackers to take control of machines, showcasing a failure in the operation or misuse of the system [54657].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident mentioned in the article is primarily related to vulnerabilities and flaws within the Microsoft Windows operating system and associated software. For example, the critical hole in TrueType font handling in the Windows kernel (MS11-087) allowed attackers to take control of a machine, and the flaw in Windows Media Player (MS11-092) required a critical update. These vulnerabilities were exploited by malware like Duqu, indicating internal weaknesses within the system [54657]. (b) outside_system: The article also mentions a software failure incident related to a compatibility issue with a third-party application, specifically SAP, which caused the postponement of a bulletin addressing a weakness in SSL and TLS encryption protocols. This external factor from a third-party application impacted Microsoft's ability to provide a full fix for the vulnerability, highlighting an issue originating from outside the system [54657].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident related to non-human actions in this case is the flaw in the TrueType font handling in the Windows kernel that could allow an attacker to take control of a machine. This flaw was being exploited by the Duqu Trojan, indicating a failure introduced without human participation [54657]. (b) The software failure incident related to human actions in this case is the postponement of a bulletin addressing a weakness in SSL and TLS encryption protocols due to a compatibility issue with SAP, a third-party application. This delay was caused by human actions related to the decision to work directly with the vendor to address the compatibility issue [54657].
Dimension (Hardware/Software) hardware, software (a) The software failure incident related to hardware: - The article mentions a critical hole in the TrueType font handling in the Windows kernel that could allow an attacker to take control of a machine. This flaw was being exploited by the Duqu malware [54657]. - The article also discusses a compatibility issue with SAP that caused the postponement of a bulletin addressing a weakness in SSL and TLS encryption protocols. This compatibility issue with a third-party application indicates a hardware-related contributing factor [54657]. (b) The software failure incident related to software: - The article highlights various critical patches released by Microsoft to fix software vulnerabilities, such as in TrueType font handling, ActiveX Kill Bits, and Windows Media Player [54657]. - Additionally, the mention of a flaw in SSL and TLS encryption protocols, which was supposed to be addressed but was postponed due to a compatibility issue with SAP, points to a software-related contributing factor [54657].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident mentioned in the article is malicious in nature. The incident involved a flaw being exploited by the Duqu Trojan, which is a type of malware designed to infiltrate systems and potentially cause harm [54657]. Additionally, the article discusses how the Duqu malware was used in the wild to infect systems, highlighting the malicious intent behind the exploitation of the software flaw. (b) The article does not provide information about a non-malicious software failure incident.
Intent (Poor/Accidental Decisions) poor_decisions (a) The software failure incident related to the delay in fixing a weakness in SSL and TLS encryption protocols was due to poor decisions introduced by a compatibility issue with SAP. Microsoft had initially planned to release a bulletin to address this weakness but had to postpone it because of the third-party application compatibility issue with SAP, as mentioned by Jerry Bryant, group manager of response communications at Microsoft Trustworthy Computing [54657].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident related to development incompetence can be seen in the delay of the fix to protect Internet Explorer users from having their encrypted communications snooped on. Microsoft had initially planned on releasing a bulletin to address a weakness in SSL and TLS encryption protocols, but it was postponed due to a compatibility issue with SAP, a third-party application. This delay in addressing a critical security vulnerability due to a compatibility issue with another software component can be attributed to a lack of professional competence in managing dependencies and ensuring timely fixes [54657]. (b) The software failure incident related to accidental factors can be observed in the discovery of a compatibility issue with SAP that led to the postponement of the bulletin addressing the SSL and TLS encryption protocols vulnerability. This compatibility issue was not intentional but was discovered during the development process, indicating an accidental introduction of factors that delayed the release of a critical security fix [54657].
Duration temporary (a) The software failure incident related to the SSL and TLS encryption protocols being vulnerable to the BEAST attack was temporary. Microsoft had initially planned to release a fix for this vulnerability but had to postpone it due to a compatibility issue with SAP, a third-party application. The bulletin addressing this security advisory was postponed, and Microsoft was working with the vendor to address the compatibility issue [54657]. (b) The software failure incident related to the TrueType font handling flaw in the Windows kernel that allowed attackers to take control of a machine was temporary. Microsoft released a patch (MS11-087) to fix this critical vulnerability that was being exploited by the Duqu malware. Security firm Qualys predicted that an exploit for this flaw would likely be developed and become available shortly after the patch release [54657].
Behaviour omission, timing, other (a) crash: The articles do not mention any software failure incident related to a crash. (b) omission: The software failure incident related to omission is the delay in releasing a fix to protect Internet Explorer users from having their encrypted communications snooped on. Microsoft had initially planned to address a weakness in SSL and TLS encryption protocols but postponed the bulletin due to a compatibility issue with SAP [54657]. (c) timing: The software failure incident related to timing is the delay in releasing a full fix for the SSL and TLS encryption protocols issue. Microsoft released a workaround in September but encountered a compatibility issue with SAP, causing the full fix to be postponed [54657]. (d) value: The articles do not mention any software failure incident related to a value failure. (e) byzantine: The articles do not mention any software failure incident related to a byzantine behavior. (f) other: The other behavior in this case is the software failure incident related to a flaw in the TrueType font handling in the Windows kernel that could allow an attacker to take control of a machine. This flaw was being exploited by the Duqu Trojan, leading to a critical security patch being issued by Microsoft [54657].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence non-human, theoretical_consequence (a) death: There is no mention of any deaths resulting from the software failure incident in the provided article [54657]. (b) harm: The article does not mention any physical harm caused to individuals due to the software failure incident [54657]. (c) basic: The incident did not impact people's access to food or shelter [54657]. (d) property: The software failure incident did not directly impact people's material goods, money, or data [54657]. (e) delay: There is no mention of any activities being postponed due to the software failure incident [54657]. (f) non-human: The software failure incident impacted non-human entities, specifically software vulnerabilities exploited by the Duqu Trojan and flaws in various Microsoft products [54657]. (g) no_consequence: The article does not mention any observed consequences resulting from the software failure incident [54657]. (h) theoretical_consequence: There were potential consequences discussed regarding the software failure incident, such as the possibility of an exploit being coded and becoming available in a short time after the patch release [54657]. (i) other: The article does not mention any other specific consequences of the software failure incident [54657].
Domain information (a) The software failure incident reported in the articles is related to the information industry. The incident involved a flaw in the TrueType font handling in the Windows kernel that could allow an attacker to take control of a machine, which was exploited by the Duqu malware [54657]. (b) No information available in the articles about the software failure incident related to the transportation industry. (c) No information available in the articles about the software failure incident related to the natural resources industry. (d) No information available in the articles about the software failure incident related to the sales industry. (e) No information available in the articles about the software failure incident related to the construction industry. (f) No information available in the articles about the software failure incident related to the manufacturing industry. (g) No information available in the articles about the software failure incident related to the utilities industry. (h) No information available in the articles about the software failure incident related to the finance industry. (i) No information available in the articles about the software failure incident related to the knowledge industry. (j) No information available in the articles about the software failure incident related to the health industry. (k) No information available in the articles about the software failure incident related to the entertainment industry. (l) No information available in the articles about the software failure incident related to the government industry. (m) No information available in the articles about the software failure incident related to any other industry.

Sources

Back to List