Microsoft Patches 19 Flaws, 6 in Vista 307
Cheesy Balogna writes "Microsoft has just released seven advisories — all rated critical — with patches for at least 19 vulnerabilities affecting the Windows operating system, the widely deployed Office productivity suite and the dominant Internet Explorer browser. Six of the 19 vulnerabilities affect Windows Vista. 'There are patches for 7 different vulnerabilities that could lead to code execution attacks against Word, Excel and Office. Users of Microsoft Exchange are also urged to pay attention to one of the critical bulletins, which cover 4 different flaws. A cumulative IE update addresses six potentially dangerous bugs. There are the six that apply to IE 7 on Windows Vista. The last bulletin in this month's batch apples to CAPICOM (Cryptographic API Component Object Model) and could also put users at risk of complete system hijack attacks.'"
Most secure windows ever! (Score:5, Funny)
Oh wait, you did expect real security instead of buzzwords?
Re:Most secure windows ever! (Score:5, Funny)
Re:No flaws in Vista itself, all 6 in IE7 (Score:5, Insightful)
Re: (Score:3, Informative)
Re: (Score:3, Informative)
Linux patches? (Score:5, Insightful)
When are we going to start seeing regular Slashdot postings outlining Linux or other free software security patch releases in the same accusatory tone that the monthly Microsoft security bulletin releases bring? No, I'm not trolling, but I'm getting sick of the clear bias Slashdot editors (and most readers) have when it comes to matters of Microsoft.
(I can feel my karma slipping away, but I couldn't take it anymore).
Re:Linux patches? (Score:4, Insightful)
Re:Linux patches? (Score:5, Funny)
Re: (Score:2)
But ultimately, you have to decide. Are you going to compare a transmission to a car? Or are you going to compare a car to a car?
Re:Linux patches? (Score:5, Funny)
Re: (Score:2, Interesting)
Re: (Score:3, Interesting)
Re: (Score:2, Insightful)
Right there in the first sentences of that quote, that bias. Those are released patches, not "downplayed patches" or "ignored vulnerabilities". Those are actual fixes, released on a monthly basis.
If Microsoft would ignore it,
Re: (Score:3, Insightful)
Microsoft has frequently been caught knowing about a bug for months before a patch is released.
When they get caught they claim they're doing QA, but past experience with Microsoft patches suggests that they are doing no valuable testing anyway.
If they had ever demonstrated trustworthiness, they might be trusted
Re: (Score:2, Insightful)
When they get caught they claim they're doing QA, but past experience with Microsoft patches suggests that they are doing no valuable testing anyway.
If they had ever demonstrated trustworthiness, they might be trusted a bit. As it is, they have demonstrated time and again that they will fuck you over and lie about it.
If you appreciate the way Microsoft treats you, then you are free to sing their praises. But it do
Re: (Score:2)
Those who forget history are condemned to repeat it.
Microsoft has always behaved poorly, and continues to behave poorly.
Yes, they are regular monthly patches. That means that they are withholding completed p
Re: (Score:2, Insightful)
Yes, they are regular monthly patches. That means that they are withholding completed patches until the chosen day comes.
Microsoft used to release as and when. They got slated on Slashdot for it.
Microsoft then rolled patches into a monthly patch. They got slated on Slashdot for it.
Microsoft released some important patches outside of the monthly cycle since they switched to it. They got slated on Slashdot for it.
Yeah, theres no pattern there at all.
With Linux, you can install patches immediately if there is a need, or later once they have had some good testing if there is not an immediate need. With Microsoft, you may install them when they say you may install them.
So, I can install a patch when its been released or later on if I decide ... in either of your cases? Wow, thats some industrial strength spin you have there!
Re: (Score:2)
So linux has no defered bugs? hmmm
I doubt that.
Re: (Score:2)
If you're going to make straw-man arguments, you really ought to try harder.
Re:Linux patches? (Score:5, Insightful)
I am the first to admit that Microsoft has problems with security, but it's a problem that plagues the entire industry. Linux, Unix, Windows, Mac, websites, forms, applications, EVERYTHING. It's a problem in how the industry approaches security. It goes far beyond Microsoft. The entire industry has this "Get it working now, patch it later" mentality. It's the "Default Allow" instead of "Default Deny" approach. There is NO reason Buffer Overflow attacks should work... EVER. Period. How hard is it to check your buffers, and make sure you're handling them properly? Very sloppy. Microsoft certainly isn't the best, but they're far from the worst. Don't believe me? Check that website, and all the security advisories for the past few years, and you will notice and interesting trend.
Re: (Score:3, Insightful)
Re:Linux patches? (Score:5, Interesting)
Take a well known game, say, a first person shooter based in WW-II. Fairly good game, kinda fun. Let's say it's released witha BIG following, and several expansions are released for it. Now imagine, that since it's initial release, it has had a vulnerability just hiding, waiting to be discovered. It is discovered, by a couple of gamers just having fun. Say there's a voting system (for kicks, map change, etc.). Let's say people use this voting system all the time to talk to people who are still alive, because it displays the vote in yellow text to everyone. Some ingenious players discover that if your vote is for a map change, and you manually enter the command and name via console something like:
callvote change_map "Shotgunner camping in the vent!!"
It's been a while so forgive the syntax if it's wrong. In any case, these intrepid gamer friends are having fun, and annoying each other with vote requests that mean nothing, and just fill the screen with yellow text (repeating gibberish to flood the screen so the player can't see). Let's say during this, both game clients crash. Hmm, well that sucks. So you go back to having fun, the server is running on an actual server in the garage so it's no biggy. Same thing happens again. The clients just crash immediately after a vote is called that is an absurd length. Hmmmm.. You get another friend involved, they join, they also crash. Interesting. Then you crash 2 clients, and have the 3rd join immediately after to see people running in place, stuck in doors, etc. Server is still running just fine. Clients however, have crashed. Now intensely curious, you start digging, and find the exact point at which is goes from "Annoying Spam Vote" to Buffer Overflow.
Now through various methods you discover that this vulnerability is definitely client specific. The server is totally unaffected. The server simply hands everything off to the clienhts, which don't know what to make of it, stuff is outside the buffer, client craps all over itself. Now someone malicious enough could take that, and create something that would quite literally be capable of hijacking any machine the game client was running on, and the only thing the user would notice MIGHT be a game crash (hell if you do it right you might be able to do it without the game itself crashing), which happens occasionally anyway, so it's ignored. Now let's say you notify the producer of this Entertainingly Amazing game, and exchange a few emails with them. 4 patches later it still isn't fixed. Several expansions later it still is not fixed.
Unacceptable. Absolutely unacceptable. And this happens throughout the industry. THAT is why security problems, are as much of a thorn in our side as they are.
*flips two coins onto the table, returns the soapbox to it's upright and locked position, and returns to her regularly scheduled nonsense*
Re: (Score:2)
Re: (Score:3, Insightful)
What conclusion is the summary supposedly spoon-feeding me?
Re:Linux patches? (Score:4, Informative)
Re: (Score:2)
I was going to say, are you gnew here but then I saw your Slashdot ID number... it has seven digits! All I have to say is, "Don't hold your breath for that to change." Actually, I, and others here, too, like it that way.
Re: (Score:2, Insightful)
Re:Linux patches? (Score:5, Funny)
That's the thing about revolution: it revolves! (Score:3, Funny)
So you work for the New AT&T then?
Re: (Score:2)
Re: (Score:2)
When the bully gets sucker-punched, it's hardly surprising that the victims would delight in it. Particularly just after the bully went through a nauseating round of marketing himself as the strongest and the toughest.
Re: (Score:2, Insightful)
You're right, Slashdot is biased against Microsoft. If you're looking for unbiased news stories, you've come to the wrong place.
Re: (Score:2, Insightful)
Perhaps you are showing your own bias?
Re:Linux patches? (Score:4, Insightful)
Re: (Score:2, Insightful)
It's like going to the Catholic church saying: Why don't you tell me everytime anybody is proven the absence of God?!
Re: (Score:2)
As long as M$ is so much more vulnerable and targetable you will always perceive a kind of bias.
To your dismay, even if Linux will have a bigger market share, it won't get that much attention from malware creators, because first the technically savvy or at least more aware users will take the leap. Lazy and/or ignorant people are the best target. And I still didn't talk about the big differences between OS security
20 critical Linux vulnaribilities in one month? (Score:2, Interesting)
Nice +5 troll post though! I will probably save that one so I can use it when I feel like trolling. Hope you don't mind.
Re:Linux patches? (Score:5, Insightful)
Frankly, I'm now getting tired of the number of posts with the same tone as yours. You lament losing Karma in a sea of angry "Linux-zealot" mods, but I would guess you will be modded up, not down. Enjoy the karma...
Re: (Score:2, Informative)
But that's the problem. Had he not posted in that type of tone, he might not have gotten modded up. I've seen many good posts defending Microsoft products without flaming the opposition yet when they hit the 4 or 5 moderation marks, people keep trying to mod them down.
I'm sure even if you removed all of the
Re: (Score:2)
It's a myth that Slashdot has almost all Linux users
Agreed.
It used to be that way, but it has long since been overrun with a more "general computing" crowd. I would bet that if you add up the regular Windows and Mac users, it would outnumber regular Linux users
Disagreed. I don't recall it ever being that way. I remember long, long ago reading that most (> 70%) of the hits on /. were coming from Microsoft Windows boxes.
For UIDs below 100k however, you would probably see a quite different statistic.
Maybe, but I don't think it matters that much.
(Posted from a Solaris box)
Re: (Score:3, Interesting)
Although I do believe that MS made some good improvements to security in Vista it would seem that it's actual performance falls short of their claims.
Summary was incorrect (Score:5, Informative)
Not, of course, that this excuses MS in any way (two is still two too many), but the summary was still rather misleading.
Re: (Score:2, Interesting)
So no, we don't see 100 preemptive individual patch stories for various linux builds on here every day.
Re: (Score:2)
I guess we can walk away with it's patch Tuesday and they're releasing patches. Good for them.
Seconded (Score:2)
Re: (Score:2)
Maybe I'm just fucking illiterate, or maybe you're just fucking retarded and trolling for karma points, but I don't see it.
"Clear" bias (Score:2)
Re: (Score:2)
When are we going to start seeing regular Slashdot postings outlining Linux or other free software security patch releases in the same accusatory tone that the monthly Microsoft security bulletin releases bring? No, I'm not trolling, but I'm getting sick of the clear bias Slashdot editors (and most readers) have when it comes to matters of Microsoft.
(I can feel my karma slipping away, but I couldn't take it anymore).
What? You thought that if you saved enough karma you could trade it in for a night with CowboyNeal or CmdrTaco? *grin* Even karma whores have to give up a few points occasionally.
Re: (Score:2)
Until then, Microsoft has completely abdicated its responsibility of providing a secure operating system, and should be routinely called to task for that.
Re: (Score:2)
Re: (Score:2)
Re:Linux patches? (Score:5, Funny)
Re: (Score:2)
Patch Tuesday is an event which has effects felt throughout the IT world. Few other security-related events have such an impact.
If you are looking for statistical analysis of security flaws, don't do it by reading Slashdot headlines.
Which is more of a threat? (Score:2, Interesting)
I don't mean to troll and I'm not necessarily disagreeing with you about a bias, but I tend to think of Microsoft vulnerabilities and patches to be more important than the Linux counterpart.
It's not my intention to imply Linux has fewer security bugs/holes/etc, because I haven't done any research in that regard.
What I am saying is that Microsoft dominates the market; so therefore a Microsoft vulnerability and patch are more newsworthy in than a more obscure piece of software, in my book. I'm not talking
Re: (Score:3, Interesting)
When are we going to start seeing regular Slashdot postings outlining Linux or other free software security patch releases in the same accusatory tone that the monthly Microsoft security bulletin releases bring? No, I'm not trolling, but I'm getting sick of the clear bias Slashdot editors (and most readers) have when it comes to matters of Microsoft.
No one's going to see this, and if they do it'll get modded down. But I'll feel better when I'm done.
You, sir, are a liar.
You complain about an accusatory tone, and when pressed to provide evidence, you admit that this advisory is actually perfectly neutral in its tone.
It makes me sick to see this kind of perverse logic through which one's critical faculties can be so twisted that even to make observations of fact and to draw logical, rational conclusions from them (e.g. Microsoft's security sucks)
Changes Default Browser (Score:5, Interesting)
Re: (Score:3, Informative)
Then I adjusted my thinking to Microsoft's point of view and tried to figure it out.
Now that IE7 is patched, it's much more secure than Firefox could ever be! Changing IE7 back to default is much like a firewall, an ounce of prevention is worth a pound of cure eh? By trying to get us back using IE7 they're just trying to prevent all the malware from getting on our systems, much like most of the rest of the patches.
It's a bit screwy, but that's the best ratio
Re: (Score:2)
An attempt to lure people back to using it? "Oh look, the shiny, I forgot how cool the new IE looks. Why did my cousin tell me to use this Mozilla thing again? Oh well, I wonder if Joe updated his MySpace..."
MS's response to this underhanded attempt? "Oh, well that was an oversight in the patching process, sorry won't happen again".
</paranoid>
Re: (Score:2)
Re: (Score:2)
Dunno. Don't understand any of this stuff. Just thinking out loud. I doubt it's an accident, though.
Re: (Score:2)
Re: (Score:2)
Upon virtually every microsoft patch Firefox and Thunderbird require me to reset my default browser and e-mail client. My guess is that this is a simple security mechanism. Hooking into the startup of e-mail and web software would be a good place for a virus to hide... Then just startup the older software and life is good. It'd be a good place to hide malware startup that is outisde of the normal places that are checked for issues.
Kirby
Re: (Score:2)
Lucky me (Score:2)
Cumulative IE 7 update 34,70 MB?? (Score:5, Interesting)
It is bigger than the x64 bit version!
Update also makes IE 7 the default browser (Score:4, Interesting)
Did they even QA this thing? The size is huge and now it also stole the default browser setting.
Re: (Score:2)
Is this even news? (Score:2, Insightful)
Cure the disease and lose the patient (Score:5, Interesting)
(yes, I lost an email I was writing last night because of this and I'm still a bit sore...)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
(yes, I lost an email I was writing last night because of this and I'm still a bit sore...)
Yes, it screwed up a drive rebuild here that had been running for about 20 hours before the reboot. There's an option "download but don't install until I tell you" that may stop this unpredictable rebooting.
Re: (Score:2)
It's too bad you weren't paying attention during your installation, in which you were asked to configure automatic updates.
It's further too bad that you didn't inspect your various settings, instead simply trusting the computer to automatically be configured to do precisely what you want it to.
It's also too bad that you don't know how to use autosave, either.
Perhaps if you learned how to use your computer, you'd h
Re: (Score:2)
Re: (Score:2)
During the OS install, you are specifically asked to configure automatic updates. Some of the service pack installs also ask you to do this.
Automatic updates are a major feature of Windows these days. They do not hide from you the fact that they will reboot
Re: (Score:3, Insightful)
During the OS install, you are specifically asked to configure automatic updates. Some of the service pack installs also ask you to do this. [...] If the user decides to just click away the dialog asking you to configure automatic updates (which many OEMs will leave for you) then that's their damage.
Hmmm.. like most people, windows was preinstalled on my machine. If enabling a feature can lose the vital work of the user, it should not be a default. Also, a clear warning of the consequences should be mad
Re: (Score:2)
That is not Microsoft's fault. It is the fault of your OEM, who chose to preconfigure that for you when they had no business doing so.
If everything works
Re: (Score:2)
Yet more reasons to love my OS X / Ubuntu setup I've got going on. The dialogue goes more like "Hey I've got these updates for you whenever you've got a second" rather than "YOU WILL INSTALL THIS NOW".
Re: (Score:2)
That concept is so new, I know.
Re: (Score:2)
Did they fix the cltreq.asp query nonsense? (Score:5, Interesting)
GET
You'd think sending these GETS to every single web site visited would be unnecessary (since IE can tell if it's connected to IIS, and only IIS is going to have cltreq.asp installed).
I'm guessing they didn't fix that one?
Re: (Score:3, Insightful)
Is there any reason someone with Chilisoft ASP couldn't implement the same functionality?
Re: (Score:2)
Please?
Re:Did they fix the cltreq.asp query nonsense? (Score:4, Interesting)
You sir, are a genius. (n/t) (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Self correcting problems (Score:2)
dominant Internet Explorer.. my ass (Score:3, Funny)
"Microsoft has just released seven dominance advisories -- all rated critical -- with dominance enhancements for at least 19 dominance threats affecting the world's premier and most popular Windows(R) operating system, the widely deployed superior Office productivity suite and the most dominant Internet Explorer browser. Six of the 19 dominance threats affect Microsoft's latest and most exciting offering, the Windows Vista Operating System. 'There are dominance enhancements for 7 different domination points that could otherwise lead to unplanned code execution in the most popular word processor of all times Word, the most powerful spreadsheet application Excel and of course spectacular Office. Users of Microsoft Exchange the kick-ass central hub of Information Technology are also urged to pay attention to all of the critical bulletins, which cover 4 different dominance features. A cumulative IE dominance update addresses six potentially cool features. There are the six that apply to the dominant IE 7 on the hugely popular Windows Vista Operating System. The last bulletin in this month's batch apples to the widely acclaimed CAPICOM (Cryptographic API Component Object Model) and could also put users at risk of complete system dominance violations.'"
Re: (Score:2)
Why didn't they find these holes earlier? (Score:5, Insightful)
On the other hand, if the rewritten portions of Vista removed 70% of the critical holes, that's pretty good. They might have been working on the right modules.
Re: (Score:2, Interesting)
Re: (Score:2)
Protected Mode? (Score:2)
Only One of the Vista Bugs was "Critical" (Score:5, Informative)
In the case of the one bug [microsoft.com] that was rated critical, the rating was dependent on several mitigating factors, including that the user running as full admin with UAC turned off. (Obviously not the default configuration.)
Only in that scenario could the machine be compromised, and even then the successful execution of exploit code was unlikely thanks to ASLR and various other security measures. It was far more likely to simply cause a browser crash.
Considering Vista has been out since November of last year, its security record [csoonline.com] so far as been extremely impressive.
Has anyone ever graphed... (Score:2)
...The number of Windows/Office/Exchange/Outlook/IE/whatever vulnerabilities/patches over time?
That seems the only way to prove or disprove the "this is the most secure version ever" claims that always accompany an upgrade.
System restart (Score:3, Interesting)
Vista patches (Score:3, Informative)
Re: (Score:2)