Microsoft: Patches, Patches Everywhere! 388
Ridgelift writes "Even though Microsoft's recently announce they would not be issuing any new patches for the month of December, the boys at Redmond were scrambling today to figure out why some systems are being patched. The reason? They haven't got a clue."
The apparent lack of a patch. (Score:4, Funny)
I guess they are going to have to issue a patch to stop the machines from patching....ironic.
Re:The apparent lack of a patch. (Score:2, Funny)
Re:The apparent lack of a patch. (Score:5, Funny)
Re:The apparent lack of a patch. (Score:3, Funny)
We once again apologize for the fault in the patch process. Those responsible for patching the patchers who have patched the patch process, have now been patched.
And with great dispatch, might I add. :) *groan*
Re:The apparent lack of a patch. (Score:5, Funny)
Re:The apparent lack of a patch. (Score:3, Funny)
Monthly patches? (Score:3, Interesting)
Re:Monthly patches? (Score:5, Informative)
Re:Monthly patches? (Score:2, Funny)
You mean there are patches available for things OTHER than vulerabilities from Microsoft? Wow. Must have missed them at the bottom of the Windows Update page after the 250 zillion Security Patches. :-)
Re:Monthly patches? (Score:5, Insightful)
Well, there are some neat non-security "patches" like the Root Cert updates, and they usually include any new versions of drivers for your hardware. The stuff that's listed under "recommended" for your OS is either those, or some annoying but not critical bug fixes, or is the subject of this rant:
What bugs me is that they also keep trying to get me to install Windows Media Player 9 and the .NET runtime, neither of which I want, particularly on a production server. Can't they take the hint that a box running W2K Advanced Server probably doesn't want WMP9? At least they don't have them selected for installation by default, but still, they should keep Windows Update to stuff that's actually updating the OS/drivers/etc. rather than applications they want me to use.
Re:Monthly patches? (Score:5, Insightful)
Yes, but, in the eyes of Microsoft, WMP9, .NET runtime, etc. are part of the OS. That's the difference between the mindset of Microsoft (one big tool that does everything) and that of the *nix world (many small tools, each that does something in particular)
Face it, Microsoft hasn't changed its viewpoint in this long, it's probably not going to happen any time soon.
Re:Monthly patches? (Score:3, Informative)
Did you know WIndows Update is configureable? If you don't want to install a particular "update", you can instruct Windows Update not to show it again. I don't know the exact name of the link in English, but it should be obvious.
Re:Monthly patches? (Score:5, Interesting)
Should I upgrade?
Media Player 6.4 won't play all of Microsofts media files anymore. WMA or ASF files created with the latest version of Media Player won't play on ver 6.4, it won't download the codecs for all of them. Subtle way for them to get people to upgrade, isn't it.
Wether that's worth upgrading for is up to you.
Re:Monthly patches? (Score:3, Informative)
Re:Monthly patches? (Score:3, Funny)
they will still release zero-hour patches for vulnerabilities which are actively being exploited in the wild
"Kewl", as the script kiddies might say. This simply means that those crackers who resist the urge to get some f4me for their new exploit by announcing it on a SadCrAck3r IRC channel have a four week window to root more boxes.
Chris
Re:Monthly patches? (Score:3, Interesting)
The company scrambled on Wednesday morning to figure out why a patch had been issued through its Windows Update service, when the software maker had declared on Tuesday that it would not issue any fixes in December.
In short, the update wasn't a 'zero-hour' patch, or a planned release.
Interestingly, this update has been mysteriously approved on our local SUS server without our
Re:Monthly patches? (Score:2, Insightful)
Re:Monthly patches? (Score:5, Insightful)
I won't argue that the longer one waits the bigger the window for an exploit, but given that a large number of exploits are created from looking at patches, it makes sense to compress the patch time so that sys admins can make time to make sure their infrastructure is updated all at once.
You may have the start of a point, but certainly not with reguard to blaster.
Exploits from patch announcements? (Score:5, Interesting)
Re:Monthly patches? (Score:3, Insightful)
Re:Monthly patches? (Score:5, Insightful)
Re:Monthly patches? (Score:2)
Re:Monthly patches? (Score:2, Interesting)
Stupid for desktop/home users (Score:3, Insightful)
It's probably just an attempt to increase the appearance of security (by decreasing patch frequency) while not actually increasing security (and in fact decreasing security as machines can be unpatched for longer).
Re:Stupid for desktop/home users (Score:5, Informative)
The admins of large scale deployments have asked Microsoft to make patches more predictable so they can do planning for patch deployment. Microsoft complied.
As others have stated, when a known vulnerability exists, or when sample code is publicly available, Microsoft will release the patch as soon as it's written.
Re:Monthly patches? (Score:3, Insightful)
Re:Monthly patches? (Score:2)
But M$ promises to put out a patch immediately if it's "critical".
Re:Monthly patches? (Score:5, Insightful)
The obvious downside is what happens when a major new remote root exploit comes out like Blaster. However, in that case the news is all over the tech media at worst, and often the mainstream media as well, so there is nothing to stop Microsoft issuing an "emergency" patch or advisory in that case and have the word get out. Unfortunately, that apparently hasn't stopped them from failing to release a patch for the remote IE exploit [slashdot.org] announced a fortnight ago.
How I read it (Score:5, Funny)
Re:Monthly patches? (Score:2)
Symantec usually issues new Anti-Virus defintions every Wednesday. Symantec also seems to tie software patches to the anti-virus update release schedule. I like this approach because it allows me to check for all Symantec updates once a week. The Symantec update schedule provides me with a reasonable degree of confidence that I am running the latest anti-virus and personal firewall software to protect my PC.
fill in joke here (Score:3, Funny)
...Yes, well...
I got it (Score:2, Informative)
The reason ? (Score:3, Funny)
Re:The reason ? (Score:4, Funny)
Patch Officer :- Sir, Out windows update service has issued a Patch today. :- But I said NO Patches in month of Dec. :- Yes Sir, but the patch issuing s/w has a bug, We need to patch it ASAP. :- But I said no patches in Dec , damn it. :- But then we won't be able to prevent the windows update service from issuing the first patch :- READ MY LIPS man, NO patches in Dec.
Billy G
Patch Officer
Billy G
Patch Officer
Billy G
Shall we say patch-22 :-)
Uhhh, they DO know? (Score:5, Interesting)
On Wednesday morning, Microsoft discovered that a glitch in the patching process resulted in a November fix not being applied to some Windows XP computers. The same patch was sent out again via the Windows update service on Tuesday night. The company is still investigating why and how the patch was reissued.
It looks like someone modified a patch. When a patch gets updated, the KB articles (and often the fixes) are auto-published.
I'd be more interested in knowing why some corporate SUS (Software Update Services, like an in-house Windows Update) subscribers were reporting to NTBugTraq today that they got about a DOZEN updated patches last night!
Re:Uhhh, they DO know? (Score:2)
I'd be more interested in knowing why some corporate SUS (Software Update Services, like an in-house Windows Update) subscribers were reporting to NTBugTraq today that they got about a DOZEN updated patches last night!
Because someone broke into Microsoft's network (again) and updated the patches with trojen?
Re:Uhhh, they DO know? (Score:2)
Re:Uhhh, they DO know? (Score:2)
I wouldn't be surprised if this was because the monthly schedule for SUS is out of sync with the main release schedule.
I run a SUS via SMS system, and last month's definition file for it didn't include MS03-051 (which I think is the Frontpage extensions patch). I believe this was because th
Re:Uhhh, they DO know? (Score:3, Interesting)
1) In answer to your suggestion that Microsoft knows what happened, allow me to point out a comment in the text that you yourself quoted:
The company is still investigating why and how the patch was reissued.
Not only do they not know WHY someone released a patch, they don't know HOW either!
Secondly, I'm also curious. I run an SUS server, and here's my sync log from last night:
Re:Uhhh, they DO know? (Score:5, Insightful)
Curious (Score:4, Funny)
What's the big deal? (Score:5, Insightful)
The patch was due out in November, but it got missed so they re-issued. It's sort of going against what they said but it's understandable and I doubt it will make the world stop spinning. Why is this front page slashdot? If it had been any other company than Microsoft it never would have been news.
Re:What's the big deal? (Score:4, Insightful)
Simply because Slashdot will take any and every opportunity to make Microsoft look bad.
Re:What's the big deal? (Score:2, Insightful)
Re:What's the big deal? (Score:2)
Bryan
Re:What's the big deal? (Score:4, Funny)
Any other company than Microsoft yes (Score:3, Interesting)
That's right (Score:5, Insightful)
But it wasn't any other company. It's the company that believes it knows what's best for everyone. The same company that believes it deserves to control all software on Earth. When they make a "big" policy change, even these insignificant ones, and then mess it up right away, it's news.
Re:What's the big deal? (Score:2)
So, it's not a big deal that they issued a patch, it's a big deal that they are freaking out about their ignorance of their own systems, procedures and processes..
Re:What's the big deal? (Score:2, Insightful)
Why is this front page slashdot? If it had been any other company than Microsoft it never would have been news.
True. The reason why this is on the front page of slashdot is, as an AC trolled:
Any other company like Microsoft no, the catch being of course that there arent any other companies like Microsft.
Of course, said troll quickly gets to the trolling, but the first part is dead-on. Microsoft is big, they're more relevant to slashdot users than any other company.
Then again, the submitter word
Where is Edward James Olmos? (Score:5, Funny)
When exactly was it that the Cylons are supposed to attack?
No way ... (Score:3, Funny)
Forget that. Begin the thawing of Lorne Greene.
Re:Where is Edward James Olmos? (Score:3, Funny)
SUS at least makes this easy. (Score:5, Insightful)
All the clients just pull the windows critical updates that we approve from OUR servers.
I feel sorry for anyone who is trying to run around and do them by hand.
Re:SUS at least makes this easy. (Score:3, Interesting)
Really? It sucks for us. Our SUS client is pointed at our corporate server. When corporate decides a patch should be installed, it gets installed on our systems. The problem? I am in QA, and our systems started acting goofy lately. In particular, our Rational applicatio
Updated patches (Score:2)
Frankengates (Score:2)
Too bad Mary Wollstonecraft Shelley wasn't alive today. "Frankenstein" could be re-written as a terrible monster bent on world domination that in order to survive must feed on a never-ending stream of patches.
Transcript (Score:4, Funny)
Fin.
Microsoft did the right thing (Score:5, Insightful)
They were probably being pretty stupid to say "no new patches". Due to Murphy's law, that guarantees that a problem will come up within days. Probably if they said "we are going to issue more patches than ever" then suddenly all their programmers would start have trouble finding bugs or figuring out how to fix them...
Anyway we can laugh at marketing for the "no new patches" but technically they did the right thing.
Re:Microsoft did the right thing (Score:2, Funny)
I was unlucky... (Score:2)
And... (Score:5, Funny)
Re:And... (Score:2)
RTFA. jesus (Score:5, Informative)
The do have a clue. Read the article. It's because a November patch for frontpage wasn't applied to some machines.
no no no, rtWfa (Score:5, Informative)
The same patch was sent out again via the Windows update service on Tuesday night. The company is still investigating why and how the patch was reissued.
So, they have a reason for it to be released, but they don't actually know why or how it got released... so... maybe 'they haven't got a clue' is a bit of overstatement, but they certainly don't have the whole clue.
Re:no no no, rtWfa (Score:2)
I meant the comment as a double entendre. Not only are they clueless as it pertains to issuing patches for their products, but Microsoft is simply clueless when it comes to security as a whole (aka www.trustworthycomputing.com [trustworthycomputing.com]). I mean seriously! Two years of shouting how serious they are abo
I dont' get it... (Score:5, Insightful)
MS makes an update server freely available, and it can serve XP Pro, NT Workstation and 2000 Workstation -- the official corporate clients.
How hard is it to have your central corporate update server get the patches DAILY, if necessary, and push them out on a schedule with SMS? Or a login script, or...
This also gives the sysadmin time to regression test some patches if that is their policy.
Big business clients -- you know, the ones benefitting from the monthly schedule -- shouldn't be using Windows Update anyway!
-Charles Hill
Re:I dont' get it... (Score:3, Insightful)
Re:I dont' get it... (Score:4, Informative)
To top it off, we have frequent problems where patches and security policy updates BREAK our programs. We can't just push it out to every client. We have to be ABSOLUTELY certain that we don't interrupt our employees ability to work. We are a Bank afterall, people DO NOT like it when their Bank can't give them their money.
You can't just gloss over this problem, it's an INCREDIBLY difficult problem. The only real solution is for MS (not just MS though, everybody) to stop releasing crappy software in the first place. Until that happens we're going to continue to be screwed no matter what we do.
Re:I dont' get it... (Score:2, Interesting)
It's not a patch (Score:5, Funny)
It' MS's fault (Score:5, Funny)
Obligatory Treasure of the Sierra Madre quote (Score:5, Funny)
Making it more intuitive and easy to use (Score:2, Interesting)
I mean, are people retarded or something? My grandpa who could barely figure out how to use a mouse was able to do an update of his computer after some simple instructions.
I suppose they could just have your PC patch itself by default but in my opinion that woul
Interesting...... (Score:2, Informative)
http://support.microsoft.com/default.aspx?scid=
Uh oh.. (Score:2, Insightful)
Holy shit!
*whew*, i think..
Double Entendre. (Score:2)
Double Entendre: a word or expression capable of two interpretations
aka: Microsoft is clueless.
No, they have got a clue. (Score:3, Insightful)
-Microsoft knows their software is weak when it comes to security.
-Microsoft pleads to the security community not to make any vulnerabilities public prior to notifying them for at least a few weeks, and sues everyone who doesn't fall in.
-Microsoft reveals the reason it wants vulnerabilites not to go public.... So CTOs can claim that security updates only happen every month rather than every day, keeping their job intact and making more money for MS in the long run.
-Somebody who cares about security rather than marketing posts a needed FrontPage Extensions update.
See.... someone at Microsoft has a clue. They just don't talk to the marketing folks. I don't blame 'em.
WTF? (Score:5, Insightful)
There will not be any patches issued in the month of december
and
they release patches more promptly than Linux vendors?
What is the benefit of no patches in Dec? (Score:3, Interesting)
What if a highly critical bug is discovered tomorrow, something big enough that several exploits are in the wild by next week? Will they release a patch then, or will they stick to their policy and hold out on us until 2004?
Addendum (Score:5, Funny)
In other news today, the Cracker community announced it would commit to new virus and worm releases on the second Wednesday in each month.
Whatever happened to One Service Pack behind? (Score:5, Interesting)
With automatic patching of machines from Windows Updates at Microsoft, it seems that everyone is thrown into chaos at the same time.
Do we really trust Microsoft enough to think that they will get their updates right everytime?
Re:Whatever happened to One Service Pack behind? (Score:5, Informative)
Automatic updates are really convenient for home users, but there is no easy way to stay one release behind. Some patches are standalone, others are bundled. Some cannot be uninstalled. Some require the presence of previous patches. It has become such a burden to stay current that it is not surprising that even people who should know better don't bother.
smaller vs. larger patches (Score:2, Troll)
Or, you can keep using larger and larger patches and eventually become a smoker.
Monthly patches are stupid (Score:5, Interesting)
You know what admins want? I'll tell you. They want to know about bugs AS THEY ARE FOUND, not AS THEY ARE PATCHED, so that we can block ports/attachments/capabilities and aren't sitting there vulnerable for months waiting for a patch. Then, when we get the patch, we want the patch to work. Lastly, we want products that aren't as much in need of patches. Are you listening? That's my top 3 requests--I don't give a rat's ass about monthly patch releases.
Here's how it works out in the real world, Microsoft. Nobody trusts your patches. After you release them, do you think we just cross our fingers and install the thing? Hell no. We do a test deployment, let it run for a few weeks, and if there aren't any problem, THEN we do the general deployment. And guess what? Frequently, we find problems with your patches and don't deploy them at all.
So this leaves us vulnerable. Sure, that's bad, but we were ALREADY vulnerable the whole time we've been using this software, and more alarmingly, we were vulnerable and you knew about it and didn't tell us while you were working on a patch.
We didn't choose to be vulnerable when we chose not to install your broken patches, we chose to be vulnerable when we chose to use your products.
No no NO! Microsoft is COMMITTED to Security! (Score:4, Funny)
www.trustworthycomputing.com [trustworthycomputing.com]
Here you go fella (Score:3, Interesting)
Windows Update became self-aware! (Score:5, Funny)
should I be worried? (Score:2)
No MS-issued patches? That's ok... (Score:2)
Everywhere? (Score:3, Insightful)
Seems like they've released yet another patch every other day this month. I know it hasn't been quite that many, but it's been several, and much more than Microsoft.
Could we have a little more fact, and a lot less Microsoft FUD? It makes Slashdot look rubbish.
The "Linux community" could stand to ridicule less and study their enemy more. Then maybe they wouldn't be slowly slipping behind the Windows Server platform more and more in providing more of the features people need.
Re:Everywhere? (Score:3, Insightful)
One patch isn't "patches, patches everywhere!". If you want to see "patches, patches everywhere" for the month of December, look at Red Hat 9.
I'd sooner trust an operating system vendor that releases prompt patches to small portions of their product, than some cowboy outfit who release occasional mega patches to their product. Besides, comparing the number of patches to RedHat 9 against those for Windows is bullshit. The typical Linux distro includes a large number of genuinely useful software packages,
Rubbish? *snicker* (Score:3, Insightful)
Actually, it makes Slashdot look like Slashdot.
Once again, we seem to have an influx of new Slashdot readers and posters. Let me spell it out for you: THIS SITE IS DECIDEDLY PRO-LINUX, PRO-OPEN SOURCE, AND ANTI-MICROSOFT. It has been since day one, and it will be until MS acquires OSDN or whoever the owner is. Deal with it, stop your bitching, and if you don't like it, there are plenty of pro-Microsoft newssites out there.
Yeesh. Every story lately these peop
This isn't the only patch (Score:3, Informative)
Patches.... (Score:5, Funny)
This is the first action of the Patch Liberation Front!
If you wanna talk SUS... (Score:3, Interesting)
(Note if you don't know what SUS is, try http://susserver.com/)
Automatic Sync Started- Thursday, 11 December 2003 12:59:56 AM Successful
Updates Added:
Critical Update for Windows XP Media Center Edition 2004 (KB830786) - KB830786_WXP_MCE2_ENU_c512cb910f28d8b6051537519556 0b3.EXE
Updates Removed:
810847: February 2003, Cumulative Patch for Internet Explorer 5.01 Service Pack 3 - Q810847_B3CA04E8D113EBDE0D561AB3AFAA02EBC3922F36.E XE
813489: April 2003, Cumulative Patch for Internet Explorer 5.01 Service Pack 3 - q813489_7526690df0c1e078957b0d83f8018c0.exe
818529: June 2003, Cumulative Patch for Internet Explorer 5.01 Service Pack 3 - q818529_1d67aa22e752bb5ca55eba289ee1e9f.exe
Q324929: December 2002, Cumulative Patch for Internet Explorer 5.5 - Q324929_E34CB7562E3FADE04E0FBA7A8DF20236ABFC6C46.E XE
810847: February 2003, Cumulative Patch for Internet Explorer 5.5 Service Pack 2 - Q810847_102065CAD52C737EBBF4422AEF2CAC5E100B6EFA.E XE
813489: April 2003, Cumulative Patch for Internet Explorer 5.5 Service Pack 2 - q813489_8ebdafa9c0f5c09d0678826b4c04de5.exe
818529: June 2003, Cumulative Patch for Internet Explorer 5.5 Service Pack 2 - q818529_d8d150d39cc718ff858be51239ea081.exe
Q324929: December 2002, Cumulative Patch for Internet Explorer 6 - Q324929_55049C7F14E3EFF258F10F95FE0A3C179833CB17.E XE
Q324929: December 2002, Cumulative Patch for Internet Explorer 6 SP1 - Q324929_A90F1A87F766965A4D0FC5F1395F3E808ABE7D27.E XE
810847: February 2003, Cumulative Patch for Internet Explorer 6 - Q810847_DDE9BE0E09FF7E261B1E32AFF6F597FA27A72B6A.E XE
810847: February 2003, Cumulative Patch for Internet Explorer 6 Service Pack 1 - Q810847_C3902604B28A9E2AAD419E883ACC553FD69B84F9.E XE
813489: April 2003, Cumulative Patch for Internet Explorer 6 - q813489_2fd2c598d4beecc513c2798f443cf8e.exe
813489: April 2003, Cumulative Patch for Internet Explorer 6 Service Pack 1 - q813489_3a4cba12c72c64d461b611365375bc9.exe
818529: June 2003, Cumulative Patch for Internet Explorer 6 - q818529_5a71949492d46d5a9ed0713ed68cc98.exe
818529: June 2003, Cumulative Patch for Internet Explorer 6 Service Pack 1 - q818529_94327511db0b86d509decf6a3becf73.exe
818529: June 2003, Cumulative Patch for Internet Explorer - WindowsServer2003-KB818529-x86-ENU_0f07225ca313bf4 5fe205783dd059d0.exe
Reissued Update(s):
Security Update, February 14, 2002 (Internet Explorer 5.5) - VBS55NEN_A76B47D34E497BB2C14BA3CBED923CC042406C8B. EXE
Security Update, March 7, 2002 - Q313829_F56D00FEAAE71A0F246EA0A042B92AEEEC822F9D.e xe
814078: Security Update (Microsoft Jscript version 5.1, Windows 2000) - js51nen_8812c08817b46676876f0e06a3cda5b.exe
814078: Security Update (Microsoft Jscript version 5.6, Windows 2000, Windows XP) - JS56_DB18C6EA0F4E8522715BEEA284F6843ECE71D944.EXE
Windows 2000 Service Pack 4 Network Install for IT Professionals - w2ksp4_en_7f12d2da3d7c5b6a62ec4fde9a4b1e6.exe
Flaw In Windows Media Player May Allow Media Library Access (819639) - WindowsMedia9-KB819639-x86-ENU_bfd620da8e1529c3e4f fadfb93f33fa.exe
Q329390: Security Update - Q329390_WXP_3F60064794271F0053892985402FE5B6679D3F 2D.EXE
Q329115: Security Update (Windows XP) - Q329115_WXP_SP2_X86_1D09793FAF21249FEBCC160D341612 338DFD3154.EXE
Security Update for Windows XP (KB810217) - WindowsXP-KB810217-x86-ENU_696190f151ea0bcb063f0a8 9471e45b.exe
Q811114: Security Update (Windows XP or Windows XP
Stealth Patch (Score:3, Interesting)
Considering the ramifications of patches and their 'assumed authority' with autopatch, this is a very bad blunder.
I still do not see the advantage (Score:4, Insightful)
...in announcing regular times when you WONT be issuing patches. What if a new flaw is discovered? Shouldn't you get the patch out ASAP? Wouldn't that be best for customers if a big security hole was discovered that needed to be FIXED NOW? (Pre-SP1 XP, anybody?)
If sysadmins wanted a monthly patch schedule, they're smart enough to do it themselves. Check WindowsUpdate every month, get all the new stuff, rinse & repeat every 30.4375 days.
I fail to see the advantage in Microsoft deliberately delaying fixes to problems that, for some, can be very very immediate.
This almost reminds me of a time when Konqueror and IE had an SSL security hole [theregister.co.uk]. While Microsoft buried its head in the sand [theregister.co.uk], the Konq guys just solved the damn problem (in a matter of hours [hackinglinuxexposed.com], if memory serves).
Maintaining important software is only hindered when some buraucratic colossus feels the need to babysit the process.
Re:This is Newsworthy? (Score:5, Insightful)
All versions of windows use this service.
If Windowsupdate sends out a bogus patch, millions of machines install the patch.
See where this is going? WindowsUpdate could easily be utalized to infect millions of machines with a virus. It could also bug out and send a patch that breaks millions of machines.
This service should *NOT* be sending out mysterious patches that no one knew anything about.
Re:it's nice to criticise, but ... (Score:4, Insightful)
You don't understand: it doesn't give me cause for concern because I _am_ a computing professional. I see software that affects thousands of computers belonging to other people where the manufacturers have no idea why. In fact, I usually have no idea why something goes wrong with my own software until I've spent a couple of hours looking at it. In fact, sometimes I never do find out what went wrong with my software.
I think you're the one that's not a computing professional