Microsoft Rereleases Patch to Fix Problems 226
AbdullahHaydar writes "From CRN: 'One day after releasing a fix for an Office XP flaw, Microsoft upgraded the severity of the vulnerability to critical and re-issued a new patch to address a new attack scenario discovered in the last 24 hours.' The funny thing is that the second bug they missed with the first fix is 'critical' whereas the original bug the fix was for is 'important.'"
It ain't necessarily so (Score:5, Insightful)
I'm no apologist for MS (see my posting history
Simon
Re:It ain't necessarily so (Score:4, Insightful)
I read the headline and the summary and it left me wondering "uh, and?"
This just in, grass is green! Whether you're OS is corporate or open source, security patches are going to happen and revisions of security patches are going to happen.
The thing is (Score:5, Insightful)
I just think the parent post dripped with a little too much bravado. And just to stay on topic
Re:It ain't necessarily so (Score:2, Funny)
I'm no apologist for MS (see my posting history :-), but re-relasing a new patch at a higher security classification ought to be applauded, not ridiculed.
Applauding Microsoft for having to re-release a patch is like applauding Idi Amin for only eating some dude's skin and muscles and not his intestines or eyeballs. Or applauding Paris Hilton for having the good sense to only videotape herself having regular and oral sex and not anal sex.
GMD
Re:It ain't necessarily so (Score:4, Funny)
I for one DO applaud Paris Hilton for doing just that. After all, videotaping yourself having ANAL sex and having it leaked all over the internet might get a little embarrasing for her. Good thing she didn't let things go THAT far!
Re:It ain't necessarily so (Score:1, Offtopic)
Re:It ain't necessarily so (Score:2, Funny)
Re:It ain't necessarily so (Score:5, Funny)
It is not a hot thing to do if you're a 300lb, hairy, sweaty slashdot nerd 'flying solo.' I beg you, slashdot readers, don't video tape yourselves in bed.
Re:It ain't necessarily so (Score:2, Informative)
Re:It ain't necessarily so (Score:2)
Start with a kidney, then work your way up.
Re:It ain't necessarily so (Score:2, Insightful)
But she's not that hot; I can go downtown to any bar in the city & get turned town by a dozen prettier girls.
Re:It ain't necessarily so (Score:2)
-B
Re:What about the recent Linux kernel vulnarabilit (Score:3, Informative)
I think you should read more slashdot before thinking they arent up to snuff with their vulnarability reporting.
Re:What about the recent Linux kernel vulnarabilit (Score:2, Insightful)
Re:What about the recent Linux kernel vulnarabilit (Score:3, Informative)
No... you're getting modded down because you're wrong.
Re:It ain't necessarily so (Score:2)
Re:It ain't necessarily so (Score:4, Insightful)
Perhaps nearly every network enabled software developer should be criticised for the same? I'm sorry, but that was an asinine statement.
Nearly every major piece of software on any OS, especially those that accept network connections have had multiple vulnerabilities over time. Even those developers who are extremely diligent (ie. OpenBSD) have had their share of problems.
Any action on a developers part, especially a proactive one, should be commended..
Re:It ain't necessarily so (Score:3, Insightful)
Clearly multiple vulnerabilities exist and are discovered. My issue is that if a new patch is released one day after the first patch was released, it appears that insufficient investigation went into the first problem. One might also want to question the level of quality control that went into the second patch.
Any action on a developers part, especially a proactive one, should be commended.
I agree that Microso
Re:It ain't necessarily so (Score:2)
BUT - and here is where your post leaves rationality - what NEW vulnerability was discovered, investigated, fixed, extensively tested, and released in those 24 hours?
G'parent post is not asinine, it makes a good point - why was a fix that evidently was already in the pipeline not released 24 hours earlier with the other patch, or, if 24 hours
Re:It ain't necessarily so (Score:5, Insightful)
So everyone could get on their ass for slow patching instead?
Look, they patched a hole in a relatively decent period of time. They then patched additional issues quickly as well.
I hate Microsoft too, but for crying out loud... how utterly fucking naive do you have to be to sit there trying to spin reasonable patch fixes against the company? Some people just need to get a life...
Re:It ain't necessarily so (Score:2)
An alternative explanation that fits the known facts is that Microsoft did not expend sufficient resources investigating the problem and fixing it. Time has nothing to do with it if they did a lousy job in the first case.
Spinning multiple fixes within a day of each other benefits no-one. Microsoft should be expected to:
1. Do
Re:It ain't necessarily so (Score:4, Insightful)
You've got to be kidding me, right? Look, I've got it in for Microsoft-the-monopoly, but not like this. They patched a damn problem and they did it fairly quickly. Even if they goofed on the first one, they took a mere 24 hours (a fairly typical OSS turnaround) to come back and offer reparations for it. Not only did they not drag their feet on the fix, they didn't drag their feet on repairs of a potential oversight from the first one.
Note the bold highlights since it's all speculation as to whether it was their goof or a mere coincidence that additional issues were discovered in the process. Some people are just trying to spin one of Microsoft's rare good moments against them as a knee-jerk reaction. I'm all for alternative OS's and choice, but on technical merit, not knee-jerk anti-MS reactions and unsubstantiated speculation.
Re:It ain't necessarily so (Score:3, Insightful)
Exactly - I'm far from a Microsoft fan. I used to sit around saying "well, let's give them the benefit of the doubt", but the more I use MS products, the less I like them and the company that made them. However, in this instance, Microsoft did a good job. STILL there are psychotic zealots trying to spin this against them.
What amazes me is that if you confront these people (likely like whatever moron modded me flamebait while I responded to your sister post) they'll claim they're doing it "for Linux" or
Re:It ain't necessarily so (Score:1)
Re:It ain't necessarily so (Score:2)
At least they fixed it, in any case. But now I'm wondering if there aren't other things they missed, or that the poor Patch Testing monkeys will find tomorrow.... not that releasing incomplete or flawed patches is that unusual for Microsoft (and yes, I'm aware that it can happen to anyone, but MS has quite a track record in that respect)
SB
Re:It ain't necessarily so (Score:2)
This article seems more a testament to the futility of patching windows, not a dig at making mistakes.
- Oxymoron: Microsoft Works
Re:It ain't necessarily so (Score:2)
Yeah, but it's totally cheating the way Redmond uses that Spell Trigger with Absolute Immunity, Spell Turning, and Spell Trap!
Re:It ain't necessarily so (Score:3, Informative)
You're new here aren't you?
This is just our Microsoft Two Minutes of Hate. When you see these posts you're supposed to seeth in rage and imagine Bill Gates.
Perhaps if we weren't such hypocrites we would be taken more seriously and more people would be running Linux for its merits and not for the hype or manufactured political reasons.
The problem.. hmm... (Score:5, Funny)
I knew eventually microsoft would do something right...
---
Universe, n.:
Re:The problem.. hmm... (Score:2, Funny)
Re:The problem.. hmm... (Score:4, Funny)
...okay, okay, I'm going to hell...
-fren
Re:The problem.. hmm... (Score:4, Funny)
Yeah, but can this patch help me drop my nicotine habit?
*grumbles*
SB
So now there's four 'R's? (Score:2, Funny)
Re:So now there's four 'R's? (Score:4, Funny)
Re:So now there's four 'R's? (Score:5, Insightful)
It reminds me of a company trying to fix problems with a popular software product so that their customers' computers aren't fucked up by hackers.
But, you know, your cartoon analogy is good, too.
This is consistent (Score:5, Funny)
Re:This is consistent (Score:2)
Re:This is consistent (Score:2, Insightful)
I know you were kidding around, but -
This is true almost everywhere. If you release information about a vulnerability before you have a fix for it you invite folks to test your shiny new vulnerability ;-)
I've been impressed with MS' stance on security since about last June - but now we see people using MS security bulletins to write worms.
Look at Blaster - MS released a security bulletin and a fix, and Blast
More information on the vulnerability (Score:5, Informative)
Re:More information on the vulnerability (Score:2, Insightful)
Much like other users have suggested, there's no reason in harrassing them. They discovered the patch was exploitable on a wider scale than previously thought, and quick
Two bugs in one place (Score:5, Insightful)
Re:Two bugs in one place (Score:4, Informative)
Re:Two bugs in one place (Score:4, Informative)
Wrong. There were two mremap bugs. Regretfully, some people with the right background didn't have time to look at the bug and the fix before the first one went public. So a second public fix was needed.
Us vs Them (Score:2, Interesting)
So this is what it's come down to? How many people share the "us" vs. "them" mentality? I thought people contributed to Linux in order to take part in something greater than what they could do alone, rather than as a way of beating Gates & Co.
I know, I know... I must be new around here.
Facts of life? (Score:5, Funny)
Patches (Score:4, Insightful)
I seem to recall a
Re:Patches (Score:1)
Not at all. It's just that Windows is plagued with exploits and viruses, while *BSD and Linux does not suffer the same fate.
Re:Patches (Score:3, Interesting)
Good thing: patches that prevent remote exploits of upnp, remote takeover via corrupted mp3 files, or valid mp3 files with embeded URL's to locations that allow script kiddies to make use of your computer, and the like.
Bad thing: patches that update the EULA to allow Microsoft to keep track of what music, videos, etc. you like to pay attention to. Patch
Uh.... (Score:3, Funny)
Apache OS (Score:5, Funny)
Right. So here we have a patch that should've probably been QA-ed to death (since they're doing this monthly instead of knee-jerk) and then later issuing another patch to properly plug the hole.
I guess after they um...opened the source to some of Windows, they're only following suit by doing the "Release early, release often" mantra. Next thing we know, they'll be sponsoring Linux-friendly news sites and even exhibiting in Open Source conventions.
Everyone should read your post... (Score:2)
Re:Everyone should read your post... (Score:2)
Re:Apache OS (Score:2, Informative)
Also, the monthly patch release scenario is NOT for critical security updates, but non-security bugfixes. Security-related patches are released as often as need be.
that patch must be huge (Score:3, Funny)
all of them?
Re:that patch must be huge (Score:1)
Re:that patch must be huge (Score:2, Funny)
Re:that patch must be huge (Score:1)
Re:that patch must be huge (Score:2)
No, you have to apply this patch [mandrakelinux.com] to fix all of them. Which is quite a large patch as you guessed.
Re:that patch must be huge (Score:2)
Great choice of article (Score:4, Funny)
Plus we can have a chance to talk about how our favorite operating system would never do such a thing! This IS a great post!
They did not re-issue a new patch! (Score:4, Informative)
http://www.microsoft.com/technet/security/bullet in/ms04-009.mspx
Read the revisions section
Re:They did not re-issue a new patch! (Score:4, Informative)
Why is Microsoft re-issuing this bulletin
Subsequent to the release of this bulletin, it was determined that this vulnerability could also affect users who do not have the "Outlook Today" folder home page as their default home page in Outlook 2002. As a result, Microsoft has re-released this bulletin with a new severity rating of "critical" to reflect the expanded attack vector. The update released with the original version of this security bulletin is effective in protecting from the vulnerability and users who have applied the update or have installed Office XP Service Pack 3 do not need to take additional action.
Re:They did not re-issue a new patch! (Score:2, Informative)
Re:They did not re-issue a new patch! (Score:2)
Re:They did not re-issue a new patch! (Score:2, Insightful)
"In addition, Microsoft is making available an additional "client update" for customers on the Microsoft Download Center. This additional update does not contain new fixes or functionality, but is instead an additional offering of the update that provides an alternative for customers. More information on the client update is available in the Security Update Information section."
They re-issued the bulletin to upgrade the security rating to "critical" due to new informa
Excuse me... (Score:5, Funny)
Anyone else notice... (Score:5, Informative)
...the broken PGP signature on the e-mail update Microsoft sent round relating to this? (The original was fine.) Just seemed a bit sloppy from a company who's now supposed to be taking security so seriously is all...
BTW The Register chastised MS for marking the original as only "important" [theregister.co.uk], looks like they were right on the money!new method (Score:2, Interesting)
Re:new method (Score:4, Informative)
FWIW, you can use Microsoft's qchain utility [microsoft.com] that purportedly allows you to apply several patches a single reboot. Haven't tried it yet, as my hours are still being spent trying to figure out what patches I need on my systems. Seems that between the Windows update site, the HFNetChk commandline utility, and a handful of patch management programs I've been looking at, I'm getting a variety of results as to what's needed and what's been installed.
If anybody has any favourite suggestions for managing this mess, I'm all ears.
Re:new method (Score:4, Informative)
Also, you should be using the new MBSA (Microsoft Baseline Security Analyser) [microsoft.com] instead of HFNetChk.
Another great tool is SUS (Software Update Services) [microsoft.com]. It's basically in internal copy of Windows Update, where you can approve patches that you've tested, and the clients will then pull approved updates down automatically according the schedule you set. Set the schedule via AD group policy, by manually editing the registry, or with a logon script.
Everytime a story like this is posted.... (Score:5, Insightful)
But why inject objectivity and reality into an otherwise excellent discussion?
Re:Everytime a story like this is posted.... (Score:2)
But why inject truth into an otherwise excellent troll?
Re:Everytime a story like this is posted.... (Score:2)
However my post was not a troll (any more than the orignal story is at any rate), and is sound even if the sources aren't in cvs... because when you look at the change logs http://www.kernel.org/pub/linux/kernel/v2.6/Chang e Log-2.6.4 and see BS like "fix build breakage" immediately after the same guy committed something that says "Fix compilation warning in bond_alb.c" well we can see just the type of developer is working on
Re:Everytime a story like this is posted.... (Score:2)
Patch requires install CDs (Score:5, Interesting)
I travel extensively for work and I don't carry around all my install CDs for my laptop. So, I cannot even install the critical security patch because I cannot install office SP2.
I think this is a problem when people that would want to install this 'critical' security patch are not able to. Why can't this patch be stand-alone (not require install CDs) like the ones available from the windows update site?
Re:Patch requires install CDs (Score:5, Informative)
OfficeXpSp3-kb832671-fullfile-enu.exe [microsoft.com] 58925 KB
attention moderators (Score:4, Funny)
Must have CD to install (Score:5, Informative)
There is a workaround: Download the larger (the 58MB one with "fullfile" in the name) file on this page here [microsoft.com] and you can do the update without a CD.
Re:Must have CD to install (Score:5, Informative)
Re:Must have CD to install (Score:2)
Luckily in that particlar case, I was able to buy and use a pirate CD ($2) so that I could update my fully licensed Office-Pro.
My copy of Office must not need the patch... (Score:4, Funny)
Thank god!
First tuesday (Score:2)
Of course we could read the updated bulletin (Score:3, Informative)
The update released with the original version of this security bulletin is effective in protecting from the vulnerability and users who have applied the update or have installed Office XP Service Pack 3 do not need to take additional action.(emphasis mine)
In addition, Microsoft is making available an additional "client update" for customers on the Microsoft Download Center. This additional update does not contain new fixes or functionality, but is instead an additional offering of the update that provides an alternative for customers. More information on the client update is available in the Security Update Information section.
So they didn't actually release a new update, just a new way of applying the update, and they increased the importance.
My question is... (Score:5, Funny)
Not the first time? (Score:4, Informative)
It seems like a patch for SP1 Internet explorer 6.0 (released released February 2, 2004 - KB832894) also broke functionality on [scotiabank.com] several websites in the form of displaying "HTTP 500 internal server error" messages for no reason. 5 days later they released [microsoft.com] a patch to fix the patch.
Slashdot is so biased (Score:3, Informative)
" In addition, Microsoft is making available an additional "client update" for customers on the Microsoft Download Center. This additional update does not contain new fixes or functionality, but is instead an additional offering of the update that provides an alternative for customers. More information on the client update is available in the Security Update Information section."
"AbdullahHaydar writes "From CRN: 'One day after releasing a fix for an Office XP flaw, Microsoft upgraded the severity of the vulnerability to critical and re-issued a new patch to address a new attack scenario discovered in the last 24 hours.' The funny thing is that the second bug they missed with the first fix is 'critical' whereas the original bug the fix was for is 'important.'"
What a deliberate trick. Bias at its worst. Why don't people check their sources?
Why can't we moderate news as Moronic or better yet moderate people as Stupid?
Good response time (Score:3, Insightful)
What Differentiates Linux from Windows (Score:3, Interesting)
Synopsis:
Microsoft reacts to marketing pressure to make design decisions favoring running a few processes faster but then finds itself forced first to layer in backward compatibility and then to engage in a patch-and-kludge upgrade process until the code becomes so bloated, slow and unreliable that wholesale replacement is again called for.
I grow weary... (Score:5, Funny)
New Service Pack (Score:4, Funny)
Nice headline (Score:3, Funny)
My first thought was, "Damn, that would be a tremendous patch."
Download? (Score:3, Interesting)
Re:Download? (Score:3, Interesting)
Wow! They've released... (Score:2)
What Else is a Patch For? (Score:3, Funny)
Well, that's a relief -- could be worse -- imagine a headline that reads "Microsoft Rereleases Patch to Cause Problems"
-kgj
critical second patch (Score:2, Funny)
But they had enough time to find out before! (Score:2)
The timeline of the vulnerability [idefense.com] tells us that Microsoft was informed November 12, 2003. Now, they got 4 months to find a patch and release their security bulletin. Couldn't they find out that it was more critical in the 24*30*4 hours before?
From MS04-009 [microsoft.com]:
Reason for Major Revision
Subsequent to the release of this bulletin, it was determined that this vulnerability could also affect users who do not have the "Outlook Today" folder home page as their default home page in Outlook 2002. As a result, Micro
Re:Yo (Score:2, Informative)
Re:Yo (Score:1)
Re:Press the ReDo button..... (Score:4, Insightful)