Valve updates bug bounty rules after Steam zero-day controversy

(Image credit: Kevin Ku / Pexels)

PC gaming giant Valve has said that banning a security research who reported a zero-day vulnerability in its Steam gaming client was “a mistake”.

Last month Russian security researcher Vasily Kravets filed a bug report in which he revealed that Steam was vulnerable to a zero-day which left Windows 10 users at risk of attack.

However, at that time HackerOne (which runs Valve's bug bounty program) told him that the bug he discovered was out of the program's scope and that Valve had no intention of patching it. The bug in question was a local privilege escalation (LPE) issue which would allow malware already present on a user's device to use Valve's Steam client to gain admin rights and take full control over the system.

HackerOne's staff also forbade Kravets from publicly disclosing the vulnerability but he eventually did so anyway and was banned from participating in Valve's bug bounty program. Valve did patch the bug disclosed by Kravets but then another researcher found another bug only a few hours later. Kravets then published details about a second LPE he found in the company's Steam client as he was unable to report it through the proper channels.

Valve bug bounty program

Valve received a great deal of criticism for ignoring LPE vulnerabilities as they are serious enough that most other companies issue patches for them when discovered in their products.

In an email to ZDNet, Valve explained that the whole situation was a massive misunderstanding, saying:

"Our HackerOne program rules were intended only to exclude reports of Steam being instructed to launch previously installed malware on a user's machine as that local user. Instead, misinterpretation of the rules also led to the exclusion of a more serious attack that also performed local privilege escalation through Steam. We have updated our HackerOne program rules to explicitly state that these issues are in scope and should be reported."

In an update to Steam's beta client, Valve has released fixes for both of the zero-day vulnerabilities discovered by Kravets and once they are tested and reviewed, these patches will be released for its main client.

Via ZDNet

TOPICS
Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.