Microsoft Sets Record With Monster Patch Tuesday 237
CWmike writes "Microsoft today issued 10 security updates that patched a record 31 vulnerabilities in Windows, Internet Explorer, Excel, Word, Windows Search and other programs, including 18 bugs marked 'critical.' Of the 10 bulletins, six patched some part of Windows, while three patched an Office application or component, and one fixed a flaw in IE. The total bug count was the most patched by Microsoft in a single month since the company began regularly scheduled updates in 2003. The previous record of 26 vulnerabilities patched occurred in both August 2008 and August 2006. 'This is a very broad bunch,' said Wolfgang Kandek, CTO at Qualys, 'compared to last month, which was really all about PowerPoint. You've got to work everywhere, servers and workstations, and even Macs if you have them. It's not getting any better, the number of vulnerabilities [Microsoft discloses] continues to grow.'"
I'm sure they could do better (Score:5, Funny)
Next tuesday they could double that amount with the right attitude...
Re: (Score:2)
Next tuesday they could double that amount with the right attitude...
They couldn't, but you can. Time to blow the dust off your father's trusted debugger!
Re: (Score:2)
And get sued for copyright infringment? No thanks.
Re: (Score:2)
You mean Dr. Watson Snr?
Comment removed (Score:5, Funny)
Re: (Score:2)
Re: (Score:2)
You're not alone...
Re:M-M-M-M-M-onster Patch! (n/t) (Score:5, Funny)
I was working on the PC late one night
When my eyes beheld an eerie sight
For bug on windows began to rise
And suddenly to my surprise
THEY DID THE PATCH
They did the monster patch
THE MONSTER PATCH
It was a vulnerability smash
THEY DID THE PATCH
They caught them in a flash
THEY DID THE PATCH
They did the monster patch
From my computer seat in the office east
To the master Ballmer where the vampires feast
The faults all came from their humble abodes
To get a jolt from my electrodes
THEY DID THE PATCH ...and so on. I only really wanted to say that your comment made me sing that song, but really it is way longer than I care to do a half-assed parody.
They did the monster patch
THE MONSTER PATCH
It was a vulnerability smash
THEY DID THE PATCH
They caught them in a flash
THEY DID THE PATCH
They did the monster patch
Microsoft is too big to fail (Score:4, Insightful)
Microsoft has become a single point of failure that poses and unacceptably enormous risk to our society's normal functioning. Consider it in light of the birthday paradox. Even if each failure is 99% safe, sooner or later we're going to have a major Warhol Worm that brings the entire Internet to its knees--along with large portions of the world's economy. Actually, I'd wager that the NSA already has the capability, and probably several other state actors, too.
Massive monoculture is always dangerous. The dinosaurs seemed incredibly successful, too, but too many of them were too similar--and look what happened. In diversity there is strength.
I'm not saying we should kill Microsoft. Just cut it up into four or five small pieces, give each of them a copy of the source code, and tell them to run with it. No non-public communications permitted, and let the customers actually have the MEANINGFUL freedom to pick and choose. Not only will there be more pressure to produce new versions, but within a few versions we'll have enough diversity to prevent totally massive fails.
Point of clarification: I'm not arguing against standards--but they need to be open and agreed upon, not imposed by and for the sake of monopoly.
Re:Microsoft is too big to fail (Score:4, Insightful)
While I agree that the Windows monocultire is a bad thing, I think it's important to remember that you could kill every single Windows machine in the world and most of the infrastructure than runs the internet would keep humming along quite happily. What's at risk is primarily desktops and corporate (intranet) servers. Losing these machines would be bad, but "brings the entire Internet to its knees" is an exaggeration. Admins would just cut off the infected machines and keep going.
Re:Microsoft is too big to fail (Score:5, Interesting)
Acknowledged. I should clarify that I am thinking of a Warhol Worm that includes a rooted backdoor for a large-scale DDoS attack. We've already had plenty of problems with zombots around 10^4, but imagine the hassles of a 10^7 zombot... I don't think it would be possible to simply cut the infected machines off the net, but rather it would be necessary to partition the entire network and rebuild in pieces.
Re: (Score:2)
When that happens it's not that difficult for an ISP to cut the infected machines off the net if they become a big problem.
However with 10^7 zombies if each zombie just DoSed a target at even as low as 128kbps per zombie it still works out to 152GBps. While some grandma in Sweden might be OK with that, many less well connected sites will still get crushed.
IMO the big problem is at l
Re: (Score:3, Insightful)
Why is it these days that when I see the words "too big to fail" attached to a company that I automatically imagine it is secretly burning down from within?
It's not a few compromised hosts. It's several millions under the control of no more than ten people. Any one of them could sht down the Internet, and would if they saw a profit in it.
Re: (Score:2)
Funny enough, the internet itself would survive, since most of it does actually not depend on Windows. What would probably take a huge hit is the economy, considering that most companies rely on Windows for processing and storage.
Tempting, I tell you, tempting the dark side is...
Re: (Score:2)
Consider that most of the people running that network infrastructure and even many unix systems perform their administrative functions from windows workstations...
Also IIS has about 1/3 of the web market, so 1/3 of websites would go offline...
A serious Windows failure would screw up a lot of things.
Re: (Score:3, Funny)
To the spineless cowardly censorious moron with the negative mod points:
Exactly what part of the post were you unable to understand? If you don't ask questions, you'll just continue being a bloody ignorant twit.
And your mother wore army boots, too.
However, I do thank you for your additional evidence of the quality of most of the moderation on /.--but it was scarcely needed. I've pretty much given up looking for funny or witty posts these days. A moderation of +5 funny apparently means that some moderators r
Re: (Score:2)
Re: (Score:2)
For pure irony, I mod you +5, Fail.
Re:Microsoft is too big to fail (Score:5, Informative)
Massive monoculture is always dangerous. The dinosaurs seemed incredibly successful, too, but too many of them were too similar--and look what happened. In diversity there is strength.
In numbers there is strength as well. There is quite some evidence that birds are the living direct descendants of the dinosaurs - and in a way I have always been puzzled on how it would be possible that all dinosaurs would become extinct but other types of animals (mammals, crocodiles) not. Dinosaurs were often huge animals, so relative few numbers before the earth is full. That is more likely to have been their undoing. When 90% gets killed, finding a mate becomes really hard due to the huge distance between individuals.
Windows is so huge in numbers that it is almost impossible to extinct. Almost always there will be some Windows computers surviving somewhere, forgotten on grandma's table, not connected to the Internet even maybe and happily moving on alone. It is impossible to wipe them all out, there are too many of them.
OS/2 is virtually extinct - some installations hanging on for dear life but there were so few of them... BeOS saw the same fate... and so there are more. Dead branches on the tree of evolution, they could not multiply sufficiently to weather the competition.
Windows is of course at risk of disease: all individuals are so similar they can easily infect one another. Some have better immune systems (firewalls, more patches installed) and may survive longer - they may even survive the main onslaught and survive the virus which itself may die out due to not enough hosts left to infect. That is after all what happened to the Spanish Flue: this strain disappeared because in the end all hosts were either immune or had died. There were virtually no fresh hosts available for the virus to survive.
Linux is reaching sufficient numbers now to also be impossible to become extinct, and add to that the large diversity in systems giving the species great immunity. Yes some groups may be vulnerable to a certain virus, others will be immune and sit out the disease. Then the ones killed by the virus will be replaced by new, immune systems and the species as a whole becomes stronger.
At the moment actually I can not think of other operating systems that are as diverse as the Linux platform. BSD is a candidate but only three major flavours available. Windows certainly is no candidate, it's all the same.
Re:Microsoft is too big to fail (Score:5, Insightful)
Back in the days of the Microsoft worms there was no default firewall and many default network exposed services, find one flaw in something and you could infect pretty much every other Windows machine on the net. They learned from that, and now there's very little chance of a machine being infected unless the machine calls out, either it's checking mail, browsing the web or whatever. Diversification is overrated, pretty much all *nix boxes use OpenSSL so how's that not a major monoculture? Or Apache for web hosting? Find me a remote exploit in the default config with no login info and you'll see full-blown panic in no time. Except that you don't. Nor has there been a major IIS security issue for ages either.
Computers don't act randomly. You minimize the contact area, analyze the heck out of it until you're really, really sure that it's correct with formal proof if you damn well please and then it will act that way. Always. Making five clones only gives you the chance to implement a bug five times more. And if it's really more sensitive than that, there's always firewalling off those entire networks. Code does not travel by magic, in short unless there's a secret port knock the NSA can do to make Windows bring down its own defenses it's not going to happen. Not anymore than I think you can break my Linux box.
Re: (Score:3, Insightful)
And after millions (billions?) of dollars spent by the government and by us, and a whole lot of confusion, ten years later there would be just one again because they'd merged/failed or bought each other. In fact, the only people that would really do well would be the major shareholders of the companies who would of course (as always) make off like bandits. Just like Bell.
Re: (Score:3, Interesting)
The geek has been piping this tune since the launch of the IBM PC
- and we all still here.
Even if each failure is 99% safe, sooner or later we're going to have a major Warhol Worm that brings the entire Internet to its knees--along with large portions of the world's economy. Actually, I'd wager that the NSA already has the capability, and probably several other state actors, too.
The positive side of the Borg icon (Score:5, Insightful)
Squashing 31 vulnerabilities in a single patch, is, in a word, efficient. "Embrace and extend," might be a negative part of the Borg ethos, but I give Microsoft credit for displaying the positive side of it, as well. ;-)
Re: (Score:2)
What would be efficient would be squashing zero vulnerabilities.
Ponder why.
Yes, I know it's almost impossible to write bug free software. But I also know what kind of bugs are fixed, and some are of the "aww heck, you're kidding, they did WHAT?" kind.
Re:The positive side of the Borg icon (Score:4, Interesting)
Squashing 31 vulnerabilities in a single patch, is, in a word, efficient.
Well, that's one way to positively spin "sat on patches until there were enough to bother with".
Sure, that's impressive, but (Score:2)
what I found really impressive about this Monster Patch is the fact that they were able to apply it to the Monster without getting bitten and slashed.
Vulnerabilities? (Score:4, Insightful)
Vulnerabilities? What does this word mean? "31 vulnerabilities, including 18 bugs marked as critical."
In my mind a bug and a vulnerability are 2 different things, one englobing the other.
Let me get this straight ... if you're telling me my computer has a "vulnerability", it means I got chances to get a notepad.exe application start out of nowhere with the words "I've hax0r Ur C8mput8r" or something in my face.
Reading the article I don't know if it's some random critical bug in some MS application, or if it depends of me running a service in X or Y situation and the attacker is in the intranet or whatever, or if I need to go to a very *very* untrusted site that even Avast! won't let me do to get attacked ... please be specific!
Every month or so there is such articles about MS patches ... hell, let's do this with every god-damn software patches around? With Ubuntu you get to install patches every week also! Heck, the Java upgrader thingy pops-up every month too.
What does "vulnerabilities" mean, in this context, seriously? Am I in danger?
Re: (Score:2)
Re:Vulnerabilities? (Score:4, Informative)
Re:Vulnerabilities? (Score:5, Informative)
A bug is something not working as intended. Slashdot's rendering on standards compliant browsers for example.
A vulnerability is something that can be exploited by a third party for example to crash, hang or invade your machine.
That in itself doesn't really tell you much, is it locally or remotely exploitable, do you need valid logins, user action etc. which means it can range from trivial to critical. If you want the details, you need to read the details... that is to say MS security bulletins.
Re: (Score:2)
Bugs can be anything from trivially annoying to "show stopper".
A vulnerability is something that can be exploited by a third party for example to crash, hang or invade your machine.
This "third party" can include the end user. In the case of servers or where it is possible to elevate privileges of a thread/process/etc.
That in itself doesn't really tell you much, is it locally or remotely expl
This is a good thing (Score:5, Insightful)
We already know Windows has vulnerabilities and that there are exploits in the wild. The design isn't going to magically change. So the fact that we're getting more patches is a good thing. We can't whine when we don't get patches then whine when we do! My only question is do these patches break any existing functionality, and if so is this clearly documented?
Re:This is a good thing (Score:4, Interesting)
A proper patch would imho only be able to break existing functionality if:
Changing a documented API should happen only between OS version changes, the second is more likely. And considering the number of bugs and undocumented API calls included in Windows that may well be a serious issue. Documenting the patch will never warn one of these issues: the undocumented API calls are, well, undocumented so technically they do not exist, and it is impossible to know beforehand which bug workarounds there are in software, if any.
So assuming MS writes their patches properly, no documented functionality will change. It may change to what the documents say it does, it may internally change giving the same end result - so no matter the documentation, testing would be the only way to make sure that your specific set of third-party or in-house software still works.
And I'm sure the above accounts for open source software as much as it does for closed source.
Re: (Score:3, Interesting)
I've seen patches - especially security patches - that break functionality in the past. Ones from MS that come to mind include breaking the ability to open older versions of Office documents and transmitting certain file extensions in Outlook. Both of those were in an Office Service pack. I have a vague recollection of other problems caused by patches but I don't have solid links. Google the phrase "windows update breaks" without the quotes.
Apple Safari Jumbo Patch 50+ Vulnerabilities Fixed (Score:5, Insightful)
"Apple Safari Jumbo Patch 50+ Vulnerabilities Fixed" - http://blogs.zdnet.com/security/?p=3541/ [zdnet.com]
Hypocrites!
Re: (Score:3, Interesting)
And that makes you a troll - you're comparing updates that affect a single browser, compared to this story, of updates that affect an entire platform.
The only Apple bias here is coming from you.
Re: (Score:2, Insightful)
Re: (Score:2)
Except that this isn't "apples to apples". Since you don't know how many actual issues and their severity are involved. Since a "patch" can involve an arbitrary number of changes. Especially with Microsoft having a policy to only issuing patches once a month.
Re:Apple Safari Jumbo Patch 50+ Vulnerabilities Fi (Score:5, Informative)
Does anybody even know what "troll" means anymore? A troll is not somebody who says something you don't like.
The point of a troll is to get replies to a fake message. A troll is something like "Back when Bill Gates invented the internet blah blah". The point there is for know-it-alls to jump up and yell that it was not Bill Gates.
The grandparent was pointing out something he saw as hypocrisy. You might not agree, but that doesn't make him a troll. He might be a troll (if he pointed it out solely to see the replies), but I think it's a valid point, and I'm willing to bet he does too.
But that's the way people are, I suppose. Ever look at 1-star reviews on Amazon? Even good 1-star reviews ("I didn't like this, and here are the reasons why") tend to have, at best, a 50% "This was helpful" rate. People check off "unhelpful" because they disagree with the reviewer. I suppose it's no surprise that the OP here decided that someone who said something he disagrees with is a troll, but it sure would be nice for people to learn how to have some form of mature debate.
Re:Apple Safari Jumbo Patch 50+ Vulnerabilities Fi (Score:5, Informative)
Of course you are; You just like to use the word hypocrite a lot, to divert attention.
5 critical updates for me (Score:2)
After reading the headline here I instantly closed firefox, opened IE and did my updates (and for Office too). 5 were listed critical. There were a total of 9 updates and some of those were for hardware.
Reading the article does not offer clarity but I suspect that this includes upd
Re: (Score:2)
Re: (Score:2)
why do you run Windows when you can do almost0 everything you have to do in open source
I think you just answered your own question.
Re: (Score:3, Interesting)
I've just checked out my Vista machine at work and it lists 16 updates, none of which is critical. I've got Vista SP2, IE8, Office 2007 SP2. I suspect that if you use the up-to-date versions of MS software then you will get far fewer critical updates.
I know that it's not fashionable to give MS any credit but my experience tells me that the quality and security of MS software are much improved from the bad old days. I think any reasonable scientific measure of critical vulnerabilities would regard Windows
Play Nice /. (Score:2, Insightful)
It's not getting any better, the number of vulnerabilities [Microsoft discloses] continues to grow.
That's quite the underhanded comment there. Insulting Microsoft while showing that they are improving their software at the same time. Nice!
Re: (Score:2)
Agreed. They are changing their business model (for the better!), they should at least get a little encouragement from us.
Truth be told, the number of undisclosed vulnerabilities that MS has patched is... undisclosed. Take for example anti-trojan patches. How many individual patches were made to keep a single trojan from spreading? Were they lumped together and called something else?
Never underestimate corporate ingenuity when it comes to telling a white ie. Sure, a patch is a patch, but it's not alwa
pan-MS patch (Score:2, Interesting)
Before you fanboys and trollboys come out of the woodwork, realize that this is across ALL the stuff - your precious Ubuntu or BSD would never have this many, simply because a distro is not also a browser, office suite, etc. It certainly isn't controlled and managed by the same group.
btw posting this from an Ubuntu machine, which just pulled down 10 updates.
Re: (Score:3, Informative)
[R]ealize that this is across ALL the stuff - your precious Ubuntu or BSD would never have this many, simply because a distro is not also a browser, office suite, etc.
The point of a distro is that it comes bundled with lots of software. It usually does include a browser, an office suite, an image editor, and more.
It certainly isn't controlled and managed by the same group.
The purpose of a distribution is to have everything managed by a single group. Sure, most -- if not all -- software comes from upstream, but the same single group does manage all of the packaging and updates for the users of said distribution.
btw posting this from an Ubuntu machine, which just pulled down 10 updates.
If you really are posting from an Ubuntu
Re: (Score:2)
Lies. Try updating Gentoo.
Oh joy! (Score:5, Funny)
Microsoft. Windows. Updates. Patches. On slashdot?
*quickly gets the popcorn and F5's the comments*
Oh good one!
*munch munch*
hahahaha funny
*munch*
ooooo
*munch munch*
Re: (Score:2)
Don't forget the meaningless eye candy!
http://en.wikipedia.org/wiki/Microsoft_Bob [wikipedia.org]
unethical technology (Score:5, Funny)
A computer consultant advocating Windows is like a doctor prescribing cigarettes. It creates a lot of extra work.
Re:unethical technology (Score:5, Funny)
A computer consultant who advocates Linux on Desktop is like doctor prescribing amputation without anasthesia.
Re: (Score:2)
"I'm prescribing you to play more games. Oh, wait, about that Linux thing..."
Sorry. Best I could come up with in lieu of mod points.
Re: (Score:2)
Mac, Linux, Windows - what's the big difference?
I have karma to burn, and am itching to burn it-:)
Re:Scary Good or Scary Bad? (Score:4, Insightful)
If somebody got a full list of bugs / sec updates for linux everymonth (all software), i'm quite sure that "31" would be quite a low number.
Of course MS could ignore them (or some), and come up with a low number, but that wouldn't be in anybodies best interests...
Re: (Score:2)
Good and bad.
It's good that they crushed a lot of bugs, but I'm used to fast and incremental crushing of bugs on Fedora.
Re: (Score:2)
Re:Scary Good or Scary Bad? (Score:4, Informative)
It benefits hackers immensely, if you have a new 0day exploit you start using it on exploit wednesday, or possibly a couple of days earlier on the basis they can't patch it that quick... then you are guaranteed at least a month before anyone will be patched against it.
Re: (Score:3, Informative)
They have released patches out of band before for high risk exploits.
Re: (Score:2)
Re: (Score:3, Insightful)
MS aren't so bad when it comes to security updates, they keep providing updates for several years after a particular version was released, such that by the time they stop very few people will still be using it, and those who are will usually be companies who made an explicit decision to stick with the old version.
Re:Scary Good or Scary Bad? (Score:5, Insightful)
Scary good. At least it shows MS is looking for problems, and fixing them as they find them. If somebody got a full list of bugs / sec updates for linux everymonth (all software), i'm quite sure that "31" would be quite a low number. Of course MS could ignore them (or some), and come up with a low number, but that wouldn't be in anybodies best interests...
It's always a shame when people use vulnerability / bug counts as some kind of definitive universal metric. The issues involved are much more complex than a single number score. And while the information can be useful, the simplest use is to debunk zealots' (Windows, Linux, etc.) claims that their software of choice is bug-free or that one particular style of development produces better quality code (if you consider bugs signs of defects that count against your quality metric). And even then, the debate could rage on (which I'll avoid doing as that's not the point right now).
Microsoft producing security patches is an overall good thing. Its a battle that was "won" quite a few years ago. And it's a battle that continues as it takes continued pressure to keep them honest (there is a history of bugs being reported to Microsoft w/out fixes over extended lengths of time). Constant pressure nudges Microsoft to resolve these issues. It's an echo of the bad old days when Microsoft cared little about responding to serious flaws in their products.
Likely it's those echos that probably mislead the masses to assume these numbers meant something that they didn't. Back in those aforementioned bad old days, the bug count outlined largely well-documented and unaddressed flaws. Now days a few of those pop up from time to time (and again - it is more common these days for "responsible disclosure" with commercial vendors to uncover flaws that go unpublished until patch release). But for the most part, those numbers represent issues that are addressed. And that is indeed a victory (bittersweet if you contend that the flaws should never have existed).
Re: (Score:2)
Security patches are good. For instance, java has a remote execution issue that is 5 month old. See this blog [bikemonkey.org]
In that page, you have a link [BEWARE, DON'T CLICK] [bikemonkey.org], which will execute arbitrary code (the guy says it is harmless, I believe him, but you don't have to), on your fully-patched, up-to-date OSX. I checked it, it works.
So, well, I, for one, guess that a high bug fix list is a good thing. I wish that Apple fix list count was one higher.
Re: (Score:2)
You also have to consider the differing disclosure models...
For an OSS distribution, all of the development is done in public so everything becomes public knowledge...
For commercial software, disclosing that your product has bugs, especially exploitable ones, is bad for business. Now when someone else finds a bug it's pretty much unavoidable so you just play nice and go along with it.. But what about bugs which are found internally? Quite often these will never be disclosed and may not be patched, some are
Re: (Score:3, Interesting)
That number of bugs rather scares me. I depend on Windows for playing WoW at home and writing documents at work. Will this kill it?
There is no need for that. I run WoW in Wine on FreeBSD, and it runs much faster and more smoothly there than it does natively in Windows.
Granted, customising FreeBSD is perhaps a little above the bullet-dodging capabilities of the average FOSS user, but Ubuntu [ubuntu.com] will still run WoW very agreeably. I'd recommend Kubuntu; I'm a KDE man in terms of the "big two," desktop environments, myself.
Re: (Score:2)
Nobody gives a shit.
Ah, the Anonymous Cowards. I'm starting to think it might be time for Slashdot to retire the ability to make anonymous comments, to be honest; I've noticed ACs becoming even more obnoxious and/or annoying than usual, recently.
Although Ubuntu's numbers on DistroWatch, as well as the amount of forum traffic they get, prove that you're wrong. Plenty of people care about it.
Re: (Score:2)
Nobody *important* gives a shit. FTFY.
Re: (Score:2, Insightful)
For MS maybe, but there have been many time that I've seen Umbuntu ask to install a list of updates longer then my johnson... Of course it is updating multiple products, but so is MS here.
Re:That's a lot of patches (Score:5, Funny)
a list of updates longer then my johnson...
Sounds like it wasn't exactly a matter of great concern then.
Re:That's a lot of patches (Score:5, Insightful)
The problem with windows is that you're not doing this at all when you check windows update/wsus - you're checking windows only- (other microsoft products if you opted-in to doing this).
This is in fact the real problem with windows- patch management is just a total nightmare.
For example, Adobe also patched today- but can you manage that upgrade at the same time? Nope.
it's mindbogglingly hard at any point in time to say you are patched when running a windows system. This is the greatest challange/weakness of windows, and the biggest benefit of Linux - package management as a means of achieving security.
Re: (Score:2)
For example, Adobe also patched today- but can you manage that upgrade at the same time? Nope.
I'm still looking for the feature that disables all auto-update checks and dialog boxes.
Re: (Score:3, Interesting)
I think what a lot of people don't like is
Re: (Score:2)
Re: (Score:2)
A quick google of "update checker" brought up this result: http://www.filehippo.com/updatechecker/ [filehippo.com]
Sounds like that might help some. I haven't tried it but running that once a month, then hitting Windows Update would probably keep your bases covered pretty well.
An
Re: (Score:3, Interesting)
I've thought for some time that Microsoft should have some type of open update scheme that other vendors could participate in. As you mention so that Adobe could submit their updates to MS and that you get all your updates through Windows update. I realize that this is a serious issue and that MS would have to run it in a benevolent manner and I think most people here would agree that MS is far from benevolent. (the FireFox plugin that was mentioned recently comes to mind) But really when you want to update
Re: (Score:2)
no need for MS to host the content, they could just create a service for patch management and let Adobe, etc host the servers. Similar to how it's done in Linux already (if it ain't broke...)
Re: (Score:2)
I've thought for some time that Microsoft should have some type of open update scheme that other vendors could participate in. As you mention so that Adobe could submit their updates to MS and that you get all your updates through Windows update.
I can't think of any reason why Windows Update couldn't do this for applications today (or even yesterday). It certainly does so for drivers.
In all likelihood the problem, as usual, lies with the application vendors.
Re: (Score:2)
Try Secunia PSI, it's pretty good for checking you're running patched software.
Re:That's a lot of patches (Score:4, Informative)
Indeed, create your own repository and have your installer add that repository to the list when your application is installed (though you should ask permission or people will get angry with you). From that point on the customer's PC will update your software automatically, it'll even warn the customer to install it quickly if you flag it as a security update.
Re: (Score:2)
As I understand it, however, there's no way to protect that application against non-authenticated users. Can you have an APT repository that, say, requires a login and password?
Re: (Score:2)
Re:That's a lot of patches (Score:5, Informative)
Re: (Score:2)
Re: (Score:2)
Re:That's a lot of patches (Score:4, Informative)
Yes, there are other ways but a couple easy methods are in this article: http://www.debian-administration.org/articles/513 [debian-adm...ration.org]
Re: (Score:2)
Re: (Score:2)
Absolutely, providing the vendor of that proprietary application provides an appropriate package repository..
If they don't, then it's the vendor's fault, the distro itself provides everything they reasonably could.
Re:That's a lot of patches (Score:4, Informative)
Exactly indeed.
I wont bother with suppling a clue, as you've obviously never seen Ubuntu or any other Linux distro.
Re: (Score:2)
I prefer Debain.
Re: (Score:2)
I prefer the HMAC.
Re: (Score:2)
Um, with Linux you have your choice between apt-get and yum, both of which let you add any repo you want. On my system, proprietary drivers, browser plugins, etc. are all kept up to date by Ubuntu automatically.
WSUS does not let you do this. As far as I can tell, you can set up your own server but you can't update non-Microsoft software.
Re: (Score:3, Insightful)
Dear DMBFCKAC, you really don't get it or are trolling as you clearly ignore the fact that, given the existence of a repository, which can exist in
many forms, including a CD or local directory, you can update just about any software from the package installer on most mainstream distros.
The Windows installer system is so fucking lame that, 14 years after the Win '95 "Start Me Up" campaign, endusers still have to babysit Add / Remove
Programs, if they want to uninstall software as they can't pick more than on
Re: (Score:2)
Re:That's a lot of patches (Score:4, Insightful)
I've seen Ubuntu ask to install a list of updates longer then my johnson
And probably 90% of them were 120KB libraries, which MS updates but doesn't list.
Is it the new fad to spell "Ubuntu" wrong? It's not that difficult. Add it to Firefox's dictionary if you have to.
Re: (Score:3, Informative)
Re:Even Macs? (Score:5, Insightful)
Safari 4 was beta before yesterday.
Re: (Score:2)
"Java VM allows arbitrary code execution on Max OSX".
(Repeat 10 times until you get it).
And before you start about how that's "not the same" because Sun is a different company, consider this. XP SP3, Vista, Windows have all been progressively more secure. ActiveX and driveby installs are *almost* a thing of the past, and the last major bad shit was Sasser Worm and the likes that exploited open services.
But nothing will stop some lemon installing the latest screensaver, or 1000 email smileys onto their syste
Re: (Score:2)
Obviously it was never meant for my department, but given the breadth of fixes, I'm wondering what kind of hell IT will catch if the Sales or Admin departments get updated and find applications broken.
As much as they deserve for putting their users in a position where they _can_ install the patches.
Re: (Score:2)
It is strange that your Sales and Administration users have the ability to run Windows update by themselves...