Skip to main content
Rate:  

Internet Explorer 11 Preview Program
Guidelines

Last updated: September 2013

THIS PROGRAM IS NOW CLOSED. GUIDELINES ARE FOR HISTORICAL PURPOSES ONLY.

PROGRAM DESCRIPTION:

Microsoft is pleased to announce the launch of the Microsoft Internet Explorer (IE) 11 Preview Bug Bounty Program beginning June 26, 2013, and ending July 26, 2013. For 30 days, individuals across the globe have the opportunity to submit vulnerabilities found in Microsoft Internet Explorer 11 Preview on our latest Windows platform. Qualified submissions are eligible for payment from a minimum of $500 USD to $11,000 USD, and bounties will be paid out at Microsoft’s discretion based on the quality and complexity of the vulnerability. Microsoft reserves the right to pay more than $11,000 USD, depending on the entry quality and complexity.

SOUND COOL? READ ON...

AM I ELIGIBLE TO PARTICIPATE?:

You are eligible to participate in this program if:

  • you are 14 years of age or older. If you are at least 14 years old but are considered a minor in your place of residence, you must ask your parent’s or legal guardian’s permission prior to participating in this program.
  • you are either an individual researcher participating in your own individual capacity, or you work for an organization that permits you to participate. You are responsible for reviewing your employer’s rules for participating in this program.

See below for a list of those who are not eligible to participate.

WHAT CONSTITUTES AN ELIGIBLE SUBMISSION?:

Vulnerability submissions (“submissions”) provided to Microsoft Corporation (“Microsoft”) must meet the following criteria to be eligible for payment:

Eligible submissions will include an original and previously unreported vulnerability in Internet Explorer 11 Preview on the latest Windows platform. Examples include, but are not limited to, Remote Code Execution (RCE), Address Space Layout Randomization (ASLR) Information Disclosure Vulnerabilities, and Sandbox Escape Vulnerabilities.

Vulnerability typeCrash dumpProof of conceptFunctioning exploitWhite paperSandbox escapeBase payout tier
RCE Vulnerabilitynot requiredrequiredrequiredrequiredrequiredTier 0
Could exceed $11,000 USD*
not requiredrequiredrequiredrequirednot required
not requiredrequiredrequiredoptionalnot requiredTier 1
maximum payment $11,000 USD
not requiredrequiredn/aoptionalnot requiredTier 2
minimum payment $1,100 USD*
Important or Higher Severity Design-Level Vulnerabilitynot requiredrequiredProof of concept is sufficientoptionalnot required
Security Bug with Privacy Implicationsnot requiredrequirednot requiredoptionalnot required
Sandbox Escape Vulnerabilitynot requiredrequiredoptionaloptionalrequired
ASLR Info Disclosure Vulnerabilitynot requiredrequiredn/aoptionaln/aTier 3
minimum payment $500 USD*

* Higher payouts are possible at Microsoft’s discretion based on level of quality and complexity. We reserve the right to reject any submission, in our sole discretion, that we determine does not meet the above criteria.

Definitions:

  • RCE vulnerability
    • A remote code execution vulnerability
  • Proof of concept
    • The files and steps necessary to reliably reproduce the vulnerability.
  • Functioning exploit
    • A proof of concept that concretely demonstrates that remote code execution is possible, such as by forcing Internet Explorer to execute a program of the attacker’s choosing (for example, calc.exe).
    • The exploit must bypass all relevant mitigations that are enabled by Internet Explorer.
  • White paper
    • A technical paper that provides details on the root cause of the vulnerability. If an exploit is provided, the document should also describe how the exploit works.
  • Important or higher severity design-level vulnerability
    • For example, a cross-domain (“Universal XSS”) bug that allows for inappropriate cookie/DOM access across security contexts within the browser.
  • Sandbox escape
    • A vulnerability in Internet Explorer that allows the attacker to escape the Protected Mode sandbox in Internet Explorer.
  • Security bug with privacy implications
    • This is an otherwise eligible behavior that aggressive or deceptive entities could leverage to invade the privacy of users—for example, inappropriate access to data about the user’s location when access has been specifically disallowed through the user interface. Issues must be scoped to the technical functionality of the browser itself and may not include privacy issues that relate to the behaviors or policies of webpages rendered by the browser.

HOW DO I PROVIDE MY SUBMISSION?

Send your complete submission to Microsoft at secure@microsoft.com.

We are not responsible for submissions that we do not receive for any reason, or for submissions that we receive but that are incomplete or indecipherable

I’VE SENT IN MY SUBMISSION. NOW WHAT?

  • You will receive an email message stating that we have received your submission.
  • Our engineers will review the submission and validate its eligibility. The review time will vary depending on the complexity and completeness of your submission, as well as on the number of submissions we receive.
  • After your submission has been validated, you will be contacted to provide the necessary paperwork to keep our legal team at bay.
  • After we receive that paperwork and confirm that you are eligible to receive payment under this program, we will deem your submission to be qualified and process your bounty!

BOUNTY PAYMENTS:

Bounties will be paid out at Microsoft’s discretion based on the detail, quality, and complexity of the vulnerability. Microsoft retains sole discretion in determining which submissions are qualified. The minimum bounty paid for a qualified submission will be $500 USD. There are no restrictions on the number of qualified submissions an individual submitter can provide and be paid for.

In the event that a submission is submitted by more than one party, if each is an eligible submission, Microsoft will consider not only time and date of submission, but also detail, quality, and complexity to be the deciding factors for eligibility of payment of the bounty.

LEGAL NOTICE:

It is your responsibility to comply with any polices that your employer may have that would affect your eligibility to participate in the bug bounty programs. If you are participating in violation of your employer’s policies, you may be disqualified from participating or receiving bounty payment(s). Government employees who want to participate are required to provide a letter from their employer’s ethics compliance officer confirming their ability to participate in this program. All payments will be compliant with local laws, regulations, and ethics rules. Microsoft disclaims any and all liability or responsibility for disputes arising between an employee and their employer related to this matter.

If we determine that your submission is qualified, Microsoft will notify you by sending a reply to your email submission. If the notification that we send is returned as undeliverable, or if you are otherwise unreachable for any reason, we may not provide payment.

If there is a dispute as to who the qualified submitter is, we will consider the eligible submitter to be the authorized account holder of the email address used to enter the program. Before receiving a bounty payment, you are required to sign an Affidavit of Eligibility (a formal statement that verifies your personal information), a Liability/Publicity Release (which provides permission for Microsoft to use your name and likeness without pursuing future claims), and a W-9 tax form or W-8 BEN tax form within 30 calendar days of notification of validation. If you want to remain anonymous to the public, we will honor your request, but we must know your legal name in order to pay you. If your submission is qualified and you are 14 or older but are considered a minor in your place of legal residence, we may require your parent or legal guardian to sign all required forms on your behalf. If you do not complete the required forms as instructed or return the required forms within the time period listed on the notification message, we may not provide payment. We cannot process payment until we have received the fully executed required documentation.

If your submission is qualified, please note:

  • you may not designate someone else as the bounty recipient unless you are considered a minor in your place of residence;
  • if you are unable or unwilling to accept your bounty, we reserve the right to rescind it;
  • if you accept a bounty, you will be solely responsible for all applicable taxes related to accepting the payment(s); and
  • if you are eligible for this program but are considered a minor in your place of residence, we may award the bounty payment to your parent/legal guardian on your behalf.

Microsoft is not claiming any ownership rights to your submission. However, by providing your submission to Microsoft, you:

  • are agreeing to license intellectual property in your submission to Microsoft (please be sure to read and accept these terms before sending us your submission), which includes an irrevocable, perpetual, royalty-free, worldwide, unlimited, nonexclusive, sub-licensable, unrestricted right and license (i) to use, review, assess, test, and otherwise analyze your submission; to reproduce, modify, distribute, display, and perform publically, and to commercialize and create derivative works of, your entry and all its content, in whole or in part, in connection with this program; and (ii) to feature your submission and all content in connection with the marketing, sale, or promotion of this program (including but not limited to internal and external sales meetings, conference presentations, tradeshows, and screen shots of the submission in press releases) in all media (now known or later developed);
  • agree to sign any necessary documentation that may be required for us or our designees to make sure of the rights you granted above;
  • understand and acknowledge that Microsoft may have developed or commissioned materials similar or identical to your submission, and you waive any claims you may have resulting from any similarities to your submission;
  • understand that you qualify for a one-time payment for each eligible vulnerability and are not guaranteed any additional compensation or credit for use of your submission; and
  • represent that your submission is your own work and you haven’t used information owned by another person or entity.

This program is hosted in the United States, and submissions are collected on computers in the United States. This program will be governed by the laws of the State of Washington, and you consent to the exclusive jurisdiction and venue of the courts of the State of Washington for any disputes that arise out of this Program.

WHO IS NOT ELIGIBLE TO PARTICIPATE?

  • A resident of any countries/regions that are under United States sanctions, such as Cuba, Iran, North Korea, Sudan, and Syria;
  • a current employee of Microsoft Corporation or a Microsoft subsidiary, or an immediate family (parent, sibling, spouse, or child) or household member of such an employee;
  • a contingent staff member or vendor employee currently working with Microsoft; or
  • a person involved in any part of the administration and execution of this Program.

The decisions made by Microsoft are final and binding. Microsoft may cancel this program at any time, for any reason. If you do not agree with these terms, please do not participate in this program .


Microsoft thanks you for your participation.

Featured Video

Trustworthy Computing's Mike Reavey, Jonathan Ness, and Katie Moussouris introduce new bounty programs for security researchers.

BlueHat Blog

Microsoft Security :: Security Vulnerability | Report a Vulnerability | MSRC:

More Posts

BlueHat Archive

See past BlueHat Sessions

BlueHat v12

BlueHat v11

BlueHat v10

BlueHat v9

BlueHat v8