Office 2010 is one example of Microsoft’s Security Development Lifecycle code development best practices in action, and “fuzz testing” is one of the strategies employed to secure the product. And the latest iteration of the Office suite being “ignored” for the May 2011 Patch Tuesday is somewhat of a trend, considering just how few security bulletins the software giant released to patch vulnerabilities in Office 2010 since GA last year.
“File fuzzing is the process of modifying file formats by feeding random data or “fuzz” into an application and then monitoring how the application responds to the data. This testing procedure is performed both by companies creating software and by attackers developing malware.”
“The Office team used automated distributed file fuzz testing to identify bugs and potential application vulnerabilities during the development of Office 2010. In addition, we continue to test throughout our support lifecycle,” Microsoft’s Alistair S. said.
“As part of our testing efforts, millions of Office files, representing the entire spectrum of over 300 different file formats across the whole Office suite were fuzzed tens of millions of times each week in different ways to try and identify new vulnerabilities in all file formats Microsoft Office opens.”
The Office 2010 suite earlier this year received accolades from security researchers Dan Kaminsky and Will Dormann which both performed independent fuzz testing on the solution.
Notably, Kaminsky and Dormann independently revealed that Office 2010 is less prone to successful exploits than open source rival StarOffice, the successor of OpenOffice.
“File fuzzing is the process of modifying file formats by feeding random data or “fuzz” into an application and then monitoring how the application responds to the data,” Alistair explained.
“This testing procedure is performed both by companies creating software and by attackers developing malware. Companies creating software use the technique to find bugs or problems within their software application and to then help ensure that the application is as secure and stable as possible before making it available to the public.”
“On the other hand, attackers developing malware use file fuzzing or file format attacks to attempt to find and then exploit vulnerability within the application. Once vulnerability is found, the attacker can create a targeted file format attack to try and exploit the vulnerability within the software application.”
[Source: Office IT Pro Blog]