Archive | Security

Security is not a feature; it’s a process. Notes on issues, patches and essays on security.

SMTP Good; MAPI Bad

Microsoft Watch from Mary Jo Foley asks “Is Microsoft Engaging in ‘Borderline Extortion’ with Security Disclosures?” “We have to admit, zero-day Internet Explorer vulnerabilities just don’t shock us any more. But the harsh words of security researcher Michal Zalewski, regarding Microsoft’s policies for dealing with vulnerabilities, did make us stand up and take notice.”

In very related news, eWEEK.com is reporting Microsoft Rocked by New IE Zero-Day Flaw Warning. “Microsoft is scrambling to address the public disclosure of a new zero-day vulnerability that could put Web surfers at risk of code execution attacks.”

Microsoft ships v. 2.0 of MS06-015 patch

In a fairly unusual move, Microsoft has re-released MS06-015, Vulnerability in Windows Explorer Could Allow Remote Code Execution (908531). Microsoft sent out an email to let folks know about that. Amazingly, while explaining why they were re-issuing the patch, they never mention what the patch is, nor specifically what went wrong, nor who should apply the new patch:

This bulletin has been re-released to
advise customers that revised versions of the security update
are available for all products listed in the “Affected Software”
section. Customers who have already applied the MS06-015 update
who are not experiencing the problem need take no action.

Here’s the quick scoop: Windows Explorer (the desktop, not the browser) has fundamentally changed the way it launches programs, and some programs that hooked into that behavior, including Hewlett-Packard’s “Share-to-Web”, older NVIDIA graphics drivers, Kerio firewall, and others, would fail to operate properly, lock up, or freeze after files are saved, especially to “My Documents” or other special folders. This patch allegedly fixes the problem.

Get Patching! Good Luck!

Microsoft keeping secrets from the good guys

From Microsoft Watch from Mary Jo Foley: Is Microsoft’s Silent Treatment Appropriate for Patches?. “Microsoft says it is withholding certain details on security vulnerabilities to protect customers from bad guys. But critics say Microsoft’s cone of security silence only increases the risk for everyone.”

An interesting article. It claims that Microsoft is keeping its bug count artificially low by silently slipstreaming multiple bug fixes into the patches and, worse, not disclosing the details even to their “trusted partners.” The bad guys know what’s patched. Why shouldn’t we? Shouldn’t “Trustworthy Computing” require more transparency than this?

Definitely not OK

Joho the Blog writes “Microsoft writes bill for Oklahoma authorizing wholesale spying. According to the Oklahoma Gazette, the state legislature has passed a bill that Microsoft helped write that gives vendors of software the right to check around your computer, delete files they consider unauthorized, and turn you into the local authorities if they don’t like the way your computer smells. This is all being done to keep you secure. Yes, you can refuse to agree to the end user license agreement, but more likely you’ll just click on it without reading the fine print. And if you refuse to sign the EULA, you don’t get to use the software. OK not OK…”

Microsoft has five patches due next Tuesday

Computerworld News reports Microsoft set to patch IE, Windows, Office. “Microsoft is set to release five security patches for its products Tuesday, including an Internet Explorer fix that will address a bug that hackers have been exploiting over the past two weeks.”

Gee, is it that time again already?

How Important Is Certification?

SysAdmin magazine asks “How Important Is Certification?.” I’ve pushed certification for years and think that certification is what you make of it: a marketing move, a means of self-validation, a way of determining a basic knowledge level, an indication of a self-starter. Paper Tigers abound in all fields. Certification is no panacea. But it’s a start. Eventually, a professional certification and licensing process like that for Engineers is inevitable, providing a balance of both legal protection and legal liability.

Powered by WordPress. Designed by Woo Themes

This work by Ted Roche is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 United States.