April 13, 2004 1:23 PM PDT
Microsoft warns of a score of security holes
- Related Stories
Report: Flaws level off, but worms still squirmingMarch 15, 2004
Outlook flaw riskier than thoughtMarch 10, 2004
Security experts bemoan poor patchingFebruary 24, 2004
200 days to fix a broken WindowsFebruary 13, 2004
Get Up to Speed on...
Get the latest headlines and
company-specific news in our
expanded GUTS section.
At least six of the flaws could make the OS susceptible to programs similar to the MSBlast worm and its variants, which have infected more than 8 million computers since last August. Another flaw affects a common file used by Internet Explorer, Outlook and Outlook Express and opens the way for the type of virus that executes when PC users click a specially crafted Web link.
The software giant released four patches to cover the 20 security issues, as part of its monthly update schedule. Microsoft wouldn't comment on the level of risk the flaws present, instead maintaining that companies that apply the fixes won't be in danger.
"If you are running a personal firewall, you are at reduced risk from a lot of these vulnerabilities," said Stephen Toulouse, security program manager for the Microsoft Security Response Center. "But we are absolutely taking this seriously."
The largest patch, MS04-011, fixes at least 14 security flaws. A security hole in the Help and Support Center affects both Windows 2003 and Windows XP. Another flaw in the Windows Meta File image format could allow an attacker to create a digital picture file that could take control of a Windows NT, 2000 or XP computer. At least six of the 14 flaws could result in a remote user taking control of a Windows computer.
Toulouse said that instead of taking a piecemeal approach, Microsoft waited to release some patches so it could present a more comprehensive set of fixes. "Rather than shipping the same files over three months, we are trying to provide customers one update that has all the fixes," he said.
However, some security researchers took the software giant to task for waiting to release a particular patch that covers many of the flaws. Microsoft's strategy, they said, was keyed more toward public relations than customer convenience.
"These releases confirm a trend that has been happening with Microsoft security lately--that they are willing to leave customers vulnerable for long periods of time, all in order to try to bundle security fixes, which leads to the (impression) of having less vulnerabilities," said Marc Maiffret, chief hacking officer for eEye Digital Security. "This is completely unacceptable."
eEye Digital Security found six of the flaws Microsoft reported on Tuesday. The company urged Windows users to update their systems as soon as possible. Maiffret has previously criticized Microsoft for taking as long as 200 days to fix flaws. He said Microsoft took as many as 216 days to fix the latest set of flaws.
Other security researchers were less critical of the software giant.
"You can't generalize that Microsoft takes too long to fix flaws," said Gerhard Eschelbeck, chief technology officer for vulnerability assessment company Qualys. "It depends on where the flaw is in the code."
Qualys found two of the flaws Microsoft announced on Tuesday. A flaw in a networking code library common to many versions of Windows only took the giant two months to fix, said Eschelbeck. Microsoft had practice, since another flaw had been found in that same library by eEye Digital Security in February.
"A lot of the flaws in this release are derivative of ones that we have seen before," said Qualys' Eschelbeck. "Typically, someone finds a flaw in a particular area and a lot of researchers start looking in that code."
That also happened with the flaw that lead to the MSBlast worm. A second, similar flaw was found in October, but it took Microsoft until now to fix it.
Overall, Eschelbeck believes that the software giant is doing the right thing by releasing a single patch for all the flaws that affect the same software components, rather than quickly releasing the fixes one at a time. Qualys had previously found that it takes at least 30 days for half of the vulnerable companies on the Internet to fix the most critical flaws. Easing the pain of patching is important, he said.
"It's a single patch on a scheduled day," he said. "Everyone knows today is Microsoft patch day. I think this is the right thing to do."
Eschelbeck recommended that companies apply at least the first patch from Microsoft by the end of the week.
Information on the four patches can be found on Microsoft's Web site.
3 commentsJoin the conversation! Add your comment