The Story of a Microsoft Patch 183
buckethead writes "eWeek is running a story about a security patch from Microsoft that failed to adequately address a denial-of-service flaw on CSRSS (Client/Server Runtime Server Subsystem), the user-mode part of the Win32 subsystem. It stems from a research paper from Argeniss that discusses how Microsoft only patched one path to the vulnerable function, but they forgot to do proper research to identify all the paths." From the article: "The problem was that Microsoft didn't patch the vulnerable function; they just added some validation code before the call to the vulnerable function, but what Microsoft missed was that the vulnerable function can be reached from different paths and the validation code was added on just one of them"
It's no wonder... (Score:5, Funny)
Re:It's no wonder... (Score:3, Funny)
A Microsoft Microsoft patch?
Too many cooks spoil the broth.
If there was just one Microsoft, they would have probably got
the patch right.
I wonder what Zonk Zonk is smoking.
Re:It's no wonder... (Score:2)
health care coverge and the patch (Score:5, Funny)
I guess one might consider Linux to be sort of a methadone. Something that hels you with your cravings for the bad stuff, but ultimately leaves you without that satsifying high.
Personally I useto OSX, but I'm not addicted. I could stop anytime I want to. I just don't want to that's all. Now excuse me while I watch the Genie effect a few times before I send this.
Re:It's no wonder... (Score:2)
Liability (Score:3, Insightful)
I'm not liable if my patches fail to patch the bug.
I'm not liable if my patches make more damages than the pathced bug.
If I do the same in restaurant business I get jailed!
It would be great at least a "pay after use", just like pizza: do you use to pay for pizza after or before you ate it?
Re:Liability (Score:5, Funny)
[...] just like pizza: do you use to pay for pizza after or before you ate it?
Usually the delivery boy won't let go of the damn box until I hand him the money.
The Trick (Score:2)
Then slam the door in his face & eat pizza while waiting for the cops to show up.
Now that you've been arrested, take this opportunity to have some fun. Use your one phone call to ring up the same pizza place and order 20 or 30 pizzas to be delivered to the police station.
Laugh!
(and hope they give you a slice or two))
Re:Liability (Score:2)
However, software is not (At least traditionally) something capable of expiring, thus I expect to pay before before use. Would you expect to pay for a car before or after you clock up 10,000 miles?
Re:Liability (Score:2)
I can't remember whether he said he'd printed it out and used it (probably, knowing how much he liked to bullshit) or whether our bullshit detectors were too much for him to take on that occasion.
Re:Liability (Score:2)
As you might know Pizza is of Italian origin.
In many, probably most, Italian road side eateries you do indeed pay first, eat later.
Re:Liability (Score:2)
I don't know what you're talking about. ``American Pizza'' may be Italian in origin, but it's an insult to claim it to have anything to do with real Italian pizza.
Re:Liability (Score:2)
Next time you're in the country try getting something at the airport or an 'Autogrill' type autostrada restaurant.
However, I DO agree with your differentiation between the Italian Pizza and the American derivative.
Microsoft is Irresponsible (Score:2)
and PR is all about appearances.
Speech Impediment? (Score:2, Funny)
Symptoms vs Causes (Score:2, Insightful)
Re:Symptoms vs Causes (Score:5, Insightful)
Re:Symptoms vs Causes (Score:2)
If I had diarreah and called Microsoft for a fix, they would tell me to either glue my sphincter shut, or upgrade to SuperSphincterServer 2004 (at substantial cost of course)
Re:Symptoms vs Causes (Score:2)
Re:Symptoms vs Causes (Score:2)
The Open Source would be use of various debuggers. Thousands of people would get together track down the bug that was giving you the runs, and surgically remove it -- leaving your ass intact.
Re:Symptoms vs Causes (Score:2)
This is sickening.
Re:Symptoms vs Causes (Score:2, Interesting)
I suggest people see my comment here [slashdot.org]. There's this vocal cross-section of astroturfing Microsoft defenders who have infiltrated Slashdot. Report the huge news that two more key executives have left? They'll bitch in the comments. Had problems with things just mysteriously not working anymore in Windows? All the "I've never had it crash in five years" people will jump down your throat to drown you out. Post the huge news that Mi
Re:Symptoms vs Causes (Score:2, Interesting)
Re:Symptoms vs Causes (Score:2)
Re:Symptoms vs Causes (Score:2)
Open source projects aren't taking your money and trying to convince you that they're shipping a fully developed professional product. Every piece of OSS that I use is understood to be in active development.
Why didn't tehy fix it right in the first place? (Score:4, Insightful)
Re:Why didn't tehy fix it right in the first place (Score:4, Insightful)
Re:Why didn't tehy fix it right in the first place (Score:1, Insightful)
Re:Why didn't tehy fix it right in the first place (Score:5, Informative)
Why didn't they fix the vulnerable function in the first place (is there a specific reason)? Sure, adding validation seems like a quick and valid fix, but a company the size of MS should have known in the long run, fix the function instead.
One possible reason is that changing the code to make it "safe" would have broken application compatability. I would be very surprised if this was not the reason...
This would explain why, instead of fixing the underlying problem, they chose to wrap it in validation to reduce the risk. It sounds like they did not do a complete analysis of the problem, but I think that's a method problem rather than a rundamental flaw in how they fixed it.
Re:Why didn't tehy fix it right in the first place (Score:3, Insightful)
The missing part of this story is that, yes, it's OK to fix the function with a wrapper or a rush-release. However, they must have known that there was a long-term problem so MS should have procedures which can handle the tracking of problems like this. In the company I work for, we have just such
Re:Why didn't tehy fix it right in the first place (Score:5, Insightful)
Coder(s): this will take two weeks to fix and test properly
Management: you've got four hours.
Re:Why didn't tehy fix it right in the first place (Score:2)
Re:Why didn't tehy fix it right in the first place (Score:2)
Re:Why didn't tehy fix it right in the first place (Score:3, Funny)
Some more examples:
3 hours -> 3 -> 6 -> 6 days
10 weeks -> 10 -> 20 -> 20 months
Re:Why didn't tehy fix it right in the first place (Score:2, Insightful)
Re:Why didn't tehy fix it right in the first place (Score:5, Interesting)
It's possible that the first fix was just a temporary measure they knew wouldn't break anything else, while they rewrote the problem function and put it through proper testing. On the other hand, this is Microsoft, so I may be being overgenerous here...
Re:Why didn't tehy fix it right in the first place (Score:5, Insightful)
More and more of the post-development activities (break/fix, SQA, implementation/packaging, etc.) for software are happening in little bubbles, somewhat removed from the core competency group that created the original code. We even see this touted as the right way to do things [itil.co.uk] from sources that are considered to experts in the process + workflow arena (well, some folks consider them experts, anyway). When this becomes the standard operating procedure, any company runs the risk of bad patches to any kind of software: you can not limit the culpability to Microsoft.
Re:Why didn't tehy fix it right in the first place (Score:2)
unpatchable (Score:3, Interesting)
Frankly it would be better if they started over again.. Look at the situation now.. even M$ themselves have to create infect a machine to track down spammers instead of fixing the root problem. Its like an aircraft with Gaffer Tape holding it together (with a paint job to make it look cool in new version of windows vXXX).. and they couldnt blame weather
I also feel really sorry for m$ coders.. they have a lot of talent but they are probably in a situation where they dont want to mess with code too much as changing things will bring the whole system down.. and a lot of chair throwing.
As Ballmer is a coder himself maybe he should join the troops in the basement and get to the fix and a steady system. Only them will users believe that Wind is a truly great system. At the moment m$ are in denial.
Is this really that bad? (Score:5, Insightful)
I understand that in a best case scenario, a vendor should release a 100% effective patch. However, in reality, that's not always going to be the case.
Microsoft released a patch that stopped the public vulnerable attack vector. Then, once they were alerted that they didn't fix all possible vectors, they issued a new patch (albeit quite a few months later).
With the large amount of bugs and vulnerabilities that a software behemoth like Windows is going to have, is it really that unthinkable that an incomplete first-patch would be released? I'd wager that even OSS products routinely have incomplete first-patches.
Re:Is this really that bad? (Score:5, Insightful)
The first question I'd now ask is what other symptoms have been patched which have left other vulnerabilities open for exploit via other attack vectors?
Re:Is this really that bad? (Score:5, Insightful)
Your underlying assumption is that Microsoft's core competency is software development, however, I think that's debatable. Over the years they've demostrated that they are a better Marketing company than a software development company.
They happen to be very fast to identify consumer needs or technology trends (either by researching or copying others) and integrate them quickly in their product portfolio. I think that aggresive way to integrate new features tends to help a lot in writing bad code.
It's not until lately, due to the size of the company and layers of bureocracy that MS is having a tough time releasing products and features to market quick enough. Since the birth of the internet they have been very reactive, but now it's taking them longer to react to the market realities and trends.
Re:Is this really that bad? (Score:2)
Actually, if you re-read his comment, he says that software is supposed to be their core competancy, not that it actually is.
And for the record, this is not the first time this has happened - am I the only one who remembers the directory traversal unicode exploits in IIS?
Re:Is this really that bad? (Score:3, Insightful)
One could also debate that the core competency is legalities, i.e., pushing the limits of the law to leverage an illegal monopoly. :-)
I agree with your comment.
Re:Give them some credit (Score:2)
I'd say, more like 0.1% of Tacomas have brakes that fail when heavily used over a short period of time, say, going downhill. So Toyota hands out free bottles of brake liquid and a rolls of duct-tape to apply at the joint by the brake pump and considers the case solved. Completely neglecting the fact that the pump leaks occur in multiple places, and won't supply new, corrected pumps to service shops until
Mod parent up, please. (Score:2)
Bugger. My mod points expired.
That's the most sensible and balanced Microsoft-related post I've read in quite a while.
Re:Is this really that bad? (Score:5, Insightful)
Re:Is this really that bad? (Score:3, Interesting)
Re:Is this really that bad? (Score:2)
Re:Is this really that bad? (Score:2)
Movie Deal (Score:5, Funny)
It's being called the "story of a dumb patch."
Soon to be a 200-part epic, starring John Goodman as Steve Balmer.
Coming to a Windows Vista box near you!
Re:Movie Deal (Score:2)
Re:Movie Deal (Score:2)
Great... (Score:3, Insightful)
Re:Great... (Score:5, Insightful)
Translation... (Score:3, Insightful)
Re:Translation... (Score:2)
This moderator generally doesn't fall for it.
Hey ... (Score:3, Funny)
The Story of a Microsoft Patch (Score:5, Funny)
A Tragedy in Three Acts
The Microsoft Patch Legend (Score:2)
Re:The Story of a Microsoft Patch (Score:2)
Security and the stock price (Score:5, Insightful)
I checked MSFT a couple of times when mail-based malware was running amok, seriously enough to reach the general news media. No effect.
If that's the overall pattern when it comes to Microsoft security issues and Microsoft's business success, it goes a long way toward explaining security missteps like MS05-018. There's no direct incentive for them to master security.
Re:Security and the stock price (Score:1)
Re:Security and the stock price (Score:3, Insightful)
Re:Security and the stock price (Score:2)
I mean, nowadays most people who use computers at home really don't understand the slighest thing about them. If they have to use it without help, they'd really be better off with a mac. (And i've nearly never used a mac in my life, but they're clearly ok for people won't know nothing about computers. They don't suppose that you kno
Re:Security and the stock price and ISA (Score:2)
Has any Windows security problem ever hurt Microsoft's stock price?
If it does, the stock price might actually go up. Companies will buy another ISA server to protect the server from its defects. Of course, Microsoft marketing does not factor in these costs to TCO. CIOs are technically backwards people but like the familiarity of a Windows screen so they buy readily into more Microsoft.
Only Microsoft could get away with producing the problem, make itself look like a hero for fixing or mitigating it and
Re:Security and the stock price (Score:4, Insightful)
Monolithic design of CSRSS is to blame here... (Score:4, Informative)
If the code to draw console windows were in a separate, unprivileged process, or even better a library, this bug would not be particularly exploitable. The worst DoS possible would be to prevent anyone from making console windows until the process was restarted.
There was another console bug a few years ago, see here [google.co.uk]. Printing a few tabs and backspaces to the console would cause the machine to blue screen.
Re:Monolithic design of CSRSS is to blame here... (Score:3, Insightful)
Re:Ever done user support? (Score:2)
Re:Monolithic design of CSRSS is to blame here... (Score:3, Informative)
Re:Monolithic design of CSRSS is to blame here... (Score:4, Interesting)
As if the patch woes are not enough..., (Score:4, Interesting)
IBM isn't any better (Score:5, Informative)
We decided to tell IBM, and they patched it. But not fully: the same hole was still open. It was not anymoe possible to access the configuration data by appending a dot, but this time is was enough to add a "%20" to the filename or something similar.
Instead of moving those configuration files out of the webroot!
Re:IBM isn't any better (Score:1)
Ah ha, I knew the black hat meant something - hackers are witches! Obviously the problem was that they didn't protect their data from being read in hex-idecimal.
Re:IBM isn't any better (Score:2)
i'm pretty sure the answer is no so if you rename a file before attaching it will end up with a different mime type (probablly application/octet-stream if your mail client doesn't recognise the extention)
So? (Score:3, Insightful)
Humans write the original code that produces bugs. Other humans (who may or may not fully understand the code they're working on because the original developer left the company) write patches to fix those bugs and in the process of doing so, create new ones.
Its the nature of the beast, it happens everywhere. Don't get me wrong, Microsofts overall record is pretty weak and I think they have made some serious design flaws with their OS, but to write a whole article on one bugfix smells a little like flamebait to me.
Re:So? (Score:2)
./sigh (Score:3, Insightful)
Re:./sigh (Score:2)
I know it's hip and cool to defend Microsoft for karma purposes, but the criticism is warranted. This is the top software company in the world whose software several country's economy's rely on. Yet the research paper shows they didn't do proper investigation, leading to two patches months apart instead of one.
How did the American economy come to rely on something so...unreliable?
Binary compatibility (Score:4, Insightful)
Re:Binary compatibility (Score:2)
Anyway, what you are saying about just introducing new APIs in patches is basically false. They wouldn't be patches if that's what they do. True, some APIs are basically deprecated while still supported, for security reasons. A rare few have been completely retired or tur
Re:Binary compatibility (Score:2)
Actually, quoting my own comment:
Unfortunately, this course of action is also not applicable to a security patch scenario
So I guess we have a case of violent agreement?
Re:Binary compatibility (Score:2)
BULLSHIT. Lack of backwards binary compatibility is the reason that NVIDIA and ATI have to resort to dirty hacks to release their drivers for Linux.
Backwards binary compatibility means that a hardware vendor can release one binary driver, without having to worry about whether it will work next month. It's not reasonable to expect every hardware company to want to release every module - but with L
Hey, its Micorosoft. This is what they do... (Score:5, Insightful)
This happens over and over and over again— with some users, I'm afraid to upgrade their software because their "world" sadly depends on the cargo cult execution of gestures to get their work done. Too many applications change how they look and feel with every upgrade that many users go off the rails whenever that happens. At least with an application, you can kind of avoid it, but when it's Windows— aw man, why not just fix the SECURITY HOLES instead of changing the UI? Please, Microsoft?
Screw it [sic; I'm being polite.], I'll keep my Mac OS X [apple.com] for clients and Gentoo Linux [gentoo.org] for servers and any web service that doesn't suck (Gmail [gmail.com], Basecamp [basecamphq.com], etc.), thank you very much.
Microsoft's days are over the moment Google decides to market an operating system that includes GFS [google.com] for redundant data-storage and their MapReduce [google.com] for batch processing. These things are big contributors to how its even possible for Google to exist. Simplicity trumps mediocrity.
the user is the ultimate security hole... (Score:2)
You can have all the protection you want and it doesn't help if the user thwarts it. The user owns the machine, they have ultimate control. They are not going to put up with not being allowed to do things like open attachments. So they have to do their best to educate the users and give them a chance to not screw themselves.
You have very little grasp of the problems involved in trying to make a machine secure without the owner's cooperation.
Apple does a terrible job (Score:2)
Yes, you have to enter your password to do root stuff on a Mac. But users are so conditioned to doing it that it ceases to provide much protection. Virtually all installers will ask for your password, so it'd be easy to put a worm out there that asks for it and then does bad things to your machine and others.
Like I said, it is difficult. Apple isn't succeeding either.
Re:Hey, its Micorosoft. This is what they do... (Score:2)
I would have thought this was an exaguration if it hadn't happened to me. I was helping a user fix a problem on her PC, and she was lost because the icon that started the program had moved on her desktop.
It's bizzare. If I moved your stapler from the left side of your desk to the right, would you call help desk?
Deja vu (Score:5, Funny)
It's a glitch in the Matrix. It usually means they've changed something...
Frequent Patching (Score:1, Troll)
Re:Frequent Patching (Score:2)
However, they didn't offer any kind of proof that these two hour reverse engineers actually occured two hours AFTER the patch release, the best they could do is say the code became PUBLICLY available two hours after the patch release.
If you have code that exploits a vulnerability, as long as everyone is quite about it you're free to exploit for your own purposes. Once a patch
Exercise (Score:3, Informative)
Remember This Story (Score:5, Insightful)
This guys a security researcher?!?! (Score:2, Insightful)
All paths?!?!
How do we know in the future that this function won't be used again in something/somewhere else? Since we all know how "wonderful" M$ is at documentation, how many here think that there'll be a note in there that specifies something extra that needs to be done before the call to that function. Talk about wasted time/money.
You patch the function that needs to be patched,
link to googles html version of the research paper (Score:2)
seems that whoever was running the server that paper was on pulled it presumablly because of the
Re:Patch (Score:2, Funny)
Re:Patch (Score:3, Interesting)
But when it's found "Hey, calling this function with these arguments causes a crash", why *isn't* fixing the function the first thing that comes to mind?
Logically your right, but Microsoft is a marketing machine. They would rather you buy another ISA server so they can profit from defects. http://www.microsoft.com/isaserver/default.mspx [microsoft.com]
Re:wait a second open sores fanboys (Score:4, Insightful)
1) Give some references, or
2) Accept the Troll moderation you are about to recieve.
Your choice..
Re:wait a second open sores fanboys (Score:2)
Re:wait a second open sores fanboys (Score:2, Informative)
Note that this is a remote root access by an anonymous user, as Samba is commonly deployed. It was indeed serious.
This vulnerability may have been the result of a vulnerability in Microsoft's SMB protocol itself, which also unpatched for about the same length of time. I can't recall at the moment, and I don't have backups of my