Security Incidents mailing list archives
Re: Microsoft's Early Xmas Present.
From: Valdis.Kletnieks () vt edu
Date: Thu, 03 Jan 2002 15:00:31 -0500
On Thu, 03 Jan 2002 08:59:03 PST, H C <keydet89 () yahoo com> said:
management and administrative nightmare, but I am also quite sick of hearing the excuse that organizations aren't subscribing to the Security Bulletins b/c there are just too many to deal with. It doesn't take much more than a few seconds to see if the issue affects you at all...if you use Eudora, then an OutLook vulnerability won't be an issue, will it?
windowsupdate.microsoft.com got hit with CodeRed because the original
Microsoft advisory stated that the vulnerability only affected certain
configurations (if you were using the Index Server). The
windowsupdate server didn't use that feature, so the patch wasn't
installed. Too bad that the vulnerability was more widespread than
the advisory originally stated.
More than a few people didn't install IIS patches because the vulnerability
list said "Windows .. Server", but their 'Windows Professional' system was
also vulnerable because when they upgraded, IIS was installed because they
had the old Personal Web Server software installed.
I may be mis-remembering the details, but I believe there was at least
one "Outlook" vulnerability that was actually an IE issue, and *did*
also affect those Eudora users who had configured a "use IE to display
text/html" option.
And in some cases, it *can* be "more than a few seconds to see". I've
seen more than a few times when a vulnerability against a Linux
program has come out, and some major detective work was required to
figure out if RedHat had already incorporated the change. If the
vulnerability was created in frobozz-1.4.3, and fixed in
frobozz-1.4.5, and RedHat is shipping a frobozz-1.4.2 that
incorporates various upstream patches from 1.4.3 through 1.4.6, are
you vulnerable or not?
Once you have a handle on what systems are *REALLY* affected, then you
get to figure out how to deploy the patch. If you're a large site that
has several hundred mission-critical servers, or have several thousand
desktops to upgrade, this can be a long, involved, and scary business.
And if a *second* critical patch comes out during the 2 weeks it takes
to download, integrate, test, and deploy the patch on your 300 critical
servers, you *really* have a problem. Do you go back to square one, and
integrate/test the combo of patches (thus leaving some systems unpatched
for the FIRST hole for another week or so), or do you delay deployment of
the second patch for another week?
How does your answer change if you worry about the patch itself being
bad (which has happend), or a *third* critical patch coming out (which
has happened)?
When your machine room is over a quarter of an acre in size, everything
is a lot more complicated (and yes, our machine room is 0.29 acres ;)
--
Valdis Kletnieks
Operating Systems Analyst
Virginia Tech
Attachment:
_bin
Description:
Current thread:
- Re: Microsoft's Early Xmas Present. Devdas Bhagat (Jan 02)
- Re: Microsoft's Early Xmas Present. Steve Stearns (Jan 02)
- Re: Microsoft's Early Xmas Present. John Sage (Jan 03)
- Re: Microsoft's Early Xmas Present. Brett Glass (Jan 03)
- Re: Microsoft's Early Xmas Present. John Sage (Jan 03)
- <Possible follow-ups>
- Re: Microsoft's Early Xmas Present. David Kennedy CISSP (Jan 03)
- Re: Microsoft's Early Xmas Present. Ryan Russell (Jan 03)
- RE: Microsoft's Early Xmas Present. Cloppert, Michael (Jan 03)
- RE: Microsoft's Early Xmas Present. H C (Jan 03)
- Re: Microsoft's Early Xmas Present. Valdis . Kletnieks (Jan 03)
- RE: Microsoft's Early Xmas Present. Eric Jon Rostetter (Jan 03)
- RE: Microsoft's Early Xmas Present. H C (Jan 03)
- RE: Microsoft's Early Xmas Present. H C (Jan 03)
- Re: Microsoft's Early Xmas Present. Steve Stearns (Jan 02)
