Microsoft has fixed a flaw in Windows disclosed by Google, claiming that it was not given enough time to fix the problem before it was made public.
Google published details of the flaw after just seven days having explained that, while it would normally sit on such things for 60 days, the firm felt it could not wait on this occasion.
"Based on our experience, we believe that more urgent action, within seven days, is appropriate for critical vulnerabilities under active exploitation," the firm said in a post on the Google Security Blog.
"The reason for this special designation is that each day an actively exploited vulnerability remains undisclosed to the public and unpatched, more computers will be compromised.
"Seven days is an aggressive timeline and may be too short for some vendors to update their products, but it should be enough time to publish advice about possible mitigations, such as temporarily disabling a service, restricting access, or contacting the vendor for more information."
Microsoft said that Google should not have exposed the flaw. "We have coordinated with Google and Adobe to investigate this malicious campaign and to create a patch for down-level versions of Windows," the firm explained in a Microsoft TechNet blog post.
"Along these lines, patches for all versions of Windows are now being tested by many industry participants, and we plan to release them publicly in the next update on 8 November.
"We believe responsible technology industry participation puts the customer first, and requires coordinated vulnerability disclosure. Google's decision to disclose these vulnerabilities before patches are broadly available and tested is disappointing, and puts customers at increased risk."
Microsoft has lived up to its promise to deliver a fix for the zero-day Windows Kernel-Mode Driver problem as part of the this month's Patch Tuesday update. Microsoft Security Bulletin MS16-135 is rated as 'Important'.
"The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system," the company explained.
Freshly launched 11nm Qualcomm silicon will come with Adreno 612 GPU
Are pinning down the exact rate of expansion of the Hubble constant
RISC OS 5 to form the basis of RISC OS Open after Castle Technology sells to RISC OS Developments
A smartphone maker fiddling its benchmarking scores? That's unusual, isn't it?