Google’s Project Zero discloses Edge browser bug after Microsoft didn’t fix it in time

Microsoft didn't make the 90-day patch window, so Project Zero shared details with the world

Google's Project Zero security team has disclosed a Microsoft Edge flaw after the Redmond firm didn't manage to fix it in time.

Details of the security bypass bug were originally shared with Microsoft on 17 November last year, but because Microsoft wasn't able to come up with a suitable patch within Google's non-negotiable 90-day fix period, the security researchers made it public.

Advertisement - Article continues below

Project Zero usually gives software companies an extension of 14 days on that 90-day window if a patch is close, but in Microsoft's case it wasn't.

Exactly 90 days post-discovery, Google revealed Microsoft's excuse, quoting: "The fix is more complex than initially anticipated, and it is very likely that we will not be able to meet the February release deadline due to these memory management issues.

"The team IS positive that this will be ready to ship on March 13th [2018-03-13], however this is beyond the 90-day SLA [service level agreement] and 14-day grace period to align with Update Tuesdays."

Google therefore published details of the bug immediately, revealing to Microsoft Edge users how they are to be without a patch for almost another month.

Luckily, the bug isn't too dangerous. Security firm Sophos pointed out that it isn't as bad as a remote code execution exploit. It's in fact a security bypass that could allow an attacker who has already wrested control from a user's browser to get past Microsoft's second layer of defence, known as an Arbitrary Code Guard (ACG).

Advertisement - Article continues below
Advertisement - Article continues below

"ACG is supposed to head off remote code execution attacks before they can make any headway," explained Sophos's Paul Ducklin in a blog post. "Very simply put, [it] works by locking down the memory that Edge uses to run its own software code."

An attacker who uses the flaw to get control via a webpage that Edge just loaded can't modify executable code that's already in memory, nor can they allocate new memory blocks in which to store rogue code, so Sophos suggested Edge users shouldn't worry too much about it.

"[While] this hole doesn't give crooks a direct way to take over your browser immediately, [Edge users] can regard it as a vulnerability that could make a bad thing worse, rather than a bad thing in the first place," Ducklin added.

Nevertheless, it's always best to keep your computer as safe as possible, so if you're an Edge browser user, look out for Microsoft's forthcoming patch. It might be that it's included in its next Patch Tuesday release.

Image: Shutterstock

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now


ethical hacking

Mobile banking apps are exposing user data to attackers

26 Jun 2020

Most malware came through HTTPS connections in Q1 2020

25 Jun 2020

Phishing attacks target unsuspecting Wells Fargo customers

24 Jun 2020

Trump administration wants to enhance the security of .gov sites

24 Jun 2020

Most Popular

Google Android

Over two dozen Android apps found stealing user data

7 Jul 2020

How to find RAM speed, size and type

24 Jun 2020

The road to recovery

30 Jun 2020