Microsoft - Here we go again

G

Gordon Darling

Microsoft warns of a score of security holes
http://news.com.com/2100-7349_3-5190818.html

"Microsoft released on Tuesday fixes that cover at least 20 Windows
flaws, several of which could make versions of the operating system
vulnerable to new worms or viruses.

At least six of the flaws could make the OS susceptible to programs
similar to the MSBlast worm and its variants, which have infected more
than 8 million computers since last August. Another flaw affects a
common file used by Internet Explorer, Outlook and Outlook Express and
opens the way for the type of virus that executes when PC users click
a specially crafted Web link.

The software giant released four patches to cover the 20 security
issues, as part of its monthly update schedule. Microsoft wouldn't
comment on the level of risk the flaws present, instead maintaining
that companies that apply the fixes won't be in danger.

"If you are running a personal firewall, you are at reduced risk from
a lot of these vulnerabilities," said Stephen Toulouse, security
program manager for the Microsoft Security Response Center. "But we
are absolutely taking this seriously."

The largest patch, MS04-011, fixes at least 14 security flaws. A
security hole in the Help and Support Center affects both Windows 2003
and Windows XP. Another flaw in the Windows Meta File image format
could allow an attacker to create a digital picture file that could
take control of a Windows NT, 2000 or XP computer. At least six of the
14 flaws could result in a remote user taking control of a Windows
computer.

Toulouse said that instead of taking a piecemeal approach, Microsoft
waited to release some patches so it could present a more
comprehensive set of fixes. "Rather than shipping the same files over
three months, we are trying to provide customers one update that has
all the fixes," he said.

However, some security researchers took the software giant to task for
waiting to release a particular patch that covers many of the flaws.
Microsoft's strategy, they said, was keyed more toward public
relations than customer convenience.

"These releases confirm a trend that has been happening with Microsoft
security lately--that they are willing to leave customers vulnerable
for long periods of time, all in order to try to bundle security
fixes, which leads to the (impression) of having less
vulnerabilities," said Marc Maiffret, chief hacking officer for eEye
Digital Security. "This is completely unacceptable."

eEye Digital Security found six of the flaws Microsoft reported on
Tuesday. The company urged Windows users to update their systems as
soon as possible. Maiffret has previously criticized Microsoft for
taking as long as 200 days to fix flaws. He said Microsoft took as
many as 216 days to fix the latest set of flaws.

Other security researchers were less critical of the software giant.

"You can't generalize that Microsoft takes too long to fix flaws,"
said Gerhard Eschelbeck, chief technology officer for vulnerability
assessment company Qualys. "It depends on when the flaw is in the
code."

Qualys found two of the flaws Microsoft announced on Tuesday. A flaw
in a networking code library common to many versions of Windows only
took the giant two months to fix, said Eschelbeck. Microsoft had
practice, since another flaw had been found in that same library by
eEye Digital Security in February.

"A lot of the flaws in this release are derivative of ones that we
have seen before," said Qualys' Eschelbeck. "Typically, someone finds
a flaw in a particular area and a lot of researchers start looking in
that code."

That also happened with the flaw that lead to the MSBlast worm. A
second, similar flaw was found in October, but it took Microsoft until
now to fix it.

Overall, Eschelbeck believes that the software giant is doing the
right thing by releasing a single patch for all the flaws that affect
the same software components, rather than quickly releasing the fixes
one at a time. Qualys had previously found that it takes at least 30
days for half of the vulnerable companies on the Internet to fix the
most critical flaws. Easing the pain of patching is important, he
said.

"It's a single patch on a scheduled day," he said. "Everyone knows
today is Microsoft patch day. I think this is the right thing to do."

Eschelbeck recommended that companies apply at least the first patch
from Microsoft by the end of the week.

Information on the four patches can be found on Microsoft's Web site."

Regards
Gordon
 
G

Gordon Darling

April 13, 2004
Today Microsoft released the following Security Bulletins.

Note: www.microsoft.com/technet/security and www.microsoft.com/security are
authoritative in all matters concerning Microsoft Security Bulletins! ANY
e-mail, web board or newsgroup posting (including this one) should be
verified by visiting these sites for official information. Microsoft never
sends security or other updates as attachments. These updates must be
downloaded from the microsoft.com download center or Windows Update. See the
individual bulletins for details.

Because some malicious messages attempt to masquerade as official Microsoft
security notices, it is recommended that you physically type the URLs into
your web browser and not click on the hyperlinks provided.

Bulletin Summaries:

Windows: http://www.microsoft.com/technet/security/Bulletin/winapr04.mspx

Critical Bulletins:

MS04-011 - Security Update for Microsoft Windows (835732)
http://www.microsoft.com/technet/security/Bulletin/MS04-011.mspx

MS04-012 - Cumulative Update for Microsoft RPC/DCOM (828741)
http://www.microsoft.com/technet/security/Bulletin/MS04-012.mspx

MS04-013 - Cumulative Security Update for Outlook Express (837009)
http://www.microsoft.com/technet/security/Bulletin/MS04-013.mspx

Important Bulletins:

MS04-014 - Vulnerability in the Microsoft Jet Database Engine Could Allow
Code Execution (837001)
http://www.microsoft.com/technet/security/Bulletin/MS04-014.mspx

Re-Released Bulletins:
The following bulletins have been re-released to advise of the availability
of updates for various versions of Microsoft Exchange Server. Please see the
bottom of each bulletin for revision information.

MS00-082 - Patch Available for 'Malformed MIME Header' Vulnerability
http://www.microsoft.com/technet/security/Bulletin/MS00-082.mspx

MS01-041 - Malformed RPC Request Can Cause Service Failure
http://www.microsoft.com/technet/security/Bulletin/MS01-041.mspx

MS02-011 - Authentication Flaw Could Allow Unauthorized Users To
Authenticate To SMTP Service
http://www.microsoft.com/technet/security/Bulletin/MS02-011.mspx


MS03-046 - Vulnerability in Exchange Server Could Allow Arbitrary Code
Execution (829436)
http://www.microsoft.com/technet/security/Bulletin/MS03-046.mspx

This represents our regularly scheduled monthly bulletin release (second
Tuesday of each month). Please note that Microsoft may release bulletins out
side of this schedule if we determine the need to do so.

If you have any questions regarding the patch or its implementation after
reading the above listed bulletin you should contact Product Support
Services in the United States at 1-866-PCSafety (1-866-727-2338).
International customers should contact their local subsidiary.

Regards
Gordon
 
J

John Corliss

Gordon said:
April 13, 2004
Today Microsoft released the following Security Bulletins.

Note: www.microsoft.com/technet/security and www.microsoft.com/security are
authoritative in all matters concerning Microsoft Security Bulletins! ANY
e-mail, web board or newsgroup posting (including this one) should be
verified by visiting these sites for official information. Microsoft never
sends security or other updates as attachments. These updates must be
downloaded from the microsoft.com download center or Windows Update. See the
individual bulletins for details.

Because some malicious messages attempt to masquerade as official Microsoft
security notices, it is recommended that you physically type the URLs into
your web browser and not click on the hyperlinks provided. (clipped)

No much to say, but I for one will pass. Hasn't anybody else wondered
why Microsoft, rather than simply getting rid of RCP, insists on doing
all they can by patching it in order to save it?

On my system, RCP has been neutered.
 
P

*ProteanThread*

John Corliss said:
No much to say, but I for one will pass. Hasn't anybody else wondered
why Microsoft, rather than simply getting rid of RCP, insists on doing
all they can by patching it in order to save it?

On my system, RCP has been neutered.

--
Regards from John Corliss
No adware, cdware, commercial software, crippleware, demoware,
nagware, shareware, spyware, time-limited software, trialware, viruses
or warez please.

But its a must have on a network I work with at work (which uses GroupWise,
btw).
 
J

John Corliss

*ProteanThread* said:
But its a must have on a network I work with at work (which uses GroupWise,
btw).

I can certainly understand that. However, the average home end user
has little need for it and in home application it's just a security
liability. Forcing home users to have all the bloat inherent in
networking software when they're not using it is ridiculous. I.e. I
can understand XP Pro having RCP, but not the home version.
 
D

derek / nul

I can certainly understand that. However, the average home end user
has little need for it and in home application it's just a security
liability. Forcing home users to have all the bloat inherent in
networking software when they're not using it is ridiculous. I.e. I
can understand XP Pro having RCP, but not the home version.

RPC is alive and well behind my firewall :)
 
J

John Corliss

derek said:
RPC is alive and well behind my firewall :)

Yup. That's the main way to do it. And from what I understand, if a
person is running XP that's about the only way. Disabling it in XP is
strongly discouraged because it causes problems.

http://www.blackviper.com/AskBV/tech10.htm

However, on my system (ME), I've taken steps to stop various .dlls
(don't ask me which, since I've forgotten at this point) from loading.
No ill effects so far and I've been running this way for about two
months now.
 
3

|3iff //ullins

Yup. That's the main way to do it.
i love it when you pretend to know what the hell you're talking about.

--
"John Corliss is a sick human being. We shouldn't hate him, we
shouldn't make fun of him, we shouldn't treat him as a pariah or a
net.idiot--above all, we shouldn't flame him. We should reach out to
him as a brother, with love and compassion, and operate on his brain."

- Gene Ward Smith
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top