S
serverguy
Ok, I am still a bit confused, maybe someone can enlighten me.
First, some background info:
http://www.internetnews.com/security/article.php/3374251
There's more. This vulnerability is still unpatched per the following
resources:
http://www.kb.cert.org/vuls/id/713878
http://xforce.iss.net/xforce/xfdb/16361
Today I read what appears to be a misguided article regarding the KB870669
patch recently released by Microsoft. Here is the article:
http://news.com.com/2010-1009-5256301.html?tag=nefd.acpro
(this guy is an Executive Editor???) I will try to explain below why I
think it is misguided.
My personal belief is that this is NOT in fact a "patch" or "fix" for the
vulnerability in question, but instead is just a partial workaround. Here
is Microsoft's page related to the issue:
http://www.microsoft.com/security/incident/Download_Ject.mspx
Note that for both home users and corporate workstations, they recommend
making manual adjustments to settings to "increase browsing safety" and
"increase security of the local machine zone in Internet Explorer" in
ADDITION to applying the 870669 patch. This suggests to me that the little
reg hack which the patch applies does little to address the vulnerability,
and it is really up to end-users and admins to protect their systems with
the manual steps listed here:
http://www.microsoft.com/security/incident/settings.mspx
and here:
http://support.microsoft.com/?kbid=871277
Granted these are known security best practices related to Internet
Explorer; however, I find it odd that MS is not simply releasing a fixall
patch for this issue - especially since it claims that it HAS FIXED this
issue with Windows XP SP2.
Also, I find it silly that technical writers are not more careful in their
research and understanding of these security issues. Mr. Berlind, in the
news.com article above, is making it sound as if 870669 is a patch and all
you need to do is go get it. He complains that he could not get it fast
enough, but he makes no effort to examine the patch itself to see if it
truly addresses the problem. He just assumes Microsoft will take care of
him, eventually.
I am not so convinced. Now, we are all being warned that IE simply cannot
be trusted anymore:
http://www.internetnews.com/security/article.php/3374931
So, in keeping an open mind, and seeing the pendulum now swinging back in
the other direction, away from Internet Explorer as the dominant browser, we
must all begin looking at the alternatives. As a network admin with
responsibilities including the security of over 1000 Windows computers and
several hundred servers, I am facing the daunting task of deciding to deploy
"workarounds," reg hacks, policies, and untold future "patches" to my users
in order to keep them safe while using IE and pray that it is enough and
that our virus protection and firewall will take care of the rest, or deploy
a new default browser to users and hope that it will be safe enough.
I am looking at Mozilla Firefox, but I have not found quality test results
related to security. Sure, many people have said it is more secure than IE,
but you would need to prove it to me. Same goes for any other browser out
there. Can anyone point me to a resource which delves into the security of
alternative browsers? I am extremely hesitant about Mozilla due to the open
source and various "usability" bugs that I have already found. If the code
is wide open, what is stopping it from being vulnerable to hackers? As for
Opera, not sure I could convince management to buy it when there are free
alternatives. Then there's the problem of all the various corporate web
apps in use that only support IE, making it the lame duck browser, if you
will. So I need lots of ammo to shoot that duck out of the sky.
The new browser war is here, commence firing!!
First, some background info:
http://www.internetnews.com/security/article.php/3374251
There's more. This vulnerability is still unpatched per the following
resources:
http://www.kb.cert.org/vuls/id/713878
http://xforce.iss.net/xforce/xfdb/16361
Today I read what appears to be a misguided article regarding the KB870669
patch recently released by Microsoft. Here is the article:
http://news.com.com/2010-1009-5256301.html?tag=nefd.acpro
(this guy is an Executive Editor???) I will try to explain below why I
think it is misguided.
My personal belief is that this is NOT in fact a "patch" or "fix" for the
vulnerability in question, but instead is just a partial workaround. Here
is Microsoft's page related to the issue:
http://www.microsoft.com/security/incident/Download_Ject.mspx
Note that for both home users and corporate workstations, they recommend
making manual adjustments to settings to "increase browsing safety" and
"increase security of the local machine zone in Internet Explorer" in
ADDITION to applying the 870669 patch. This suggests to me that the little
reg hack which the patch applies does little to address the vulnerability,
and it is really up to end-users and admins to protect their systems with
the manual steps listed here:
http://www.microsoft.com/security/incident/settings.mspx
and here:
http://support.microsoft.com/?kbid=871277
Granted these are known security best practices related to Internet
Explorer; however, I find it odd that MS is not simply releasing a fixall
patch for this issue - especially since it claims that it HAS FIXED this
issue with Windows XP SP2.
Also, I find it silly that technical writers are not more careful in their
research and understanding of these security issues. Mr. Berlind, in the
news.com article above, is making it sound as if 870669 is a patch and all
you need to do is go get it. He complains that he could not get it fast
enough, but he makes no effort to examine the patch itself to see if it
truly addresses the problem. He just assumes Microsoft will take care of
him, eventually.
I am not so convinced. Now, we are all being warned that IE simply cannot
be trusted anymore:
http://www.internetnews.com/security/article.php/3374931
So, in keeping an open mind, and seeing the pendulum now swinging back in
the other direction, away from Internet Explorer as the dominant browser, we
must all begin looking at the alternatives. As a network admin with
responsibilities including the security of over 1000 Windows computers and
several hundred servers, I am facing the daunting task of deciding to deploy
"workarounds," reg hacks, policies, and untold future "patches" to my users
in order to keep them safe while using IE and pray that it is enough and
that our virus protection and firewall will take care of the rest, or deploy
a new default browser to users and hope that it will be safe enough.
I am looking at Mozilla Firefox, but I have not found quality test results
related to security. Sure, many people have said it is more secure than IE,
but you would need to prove it to me. Same goes for any other browser out
there. Can anyone point me to a resource which delves into the security of
alternative browsers? I am extremely hesitant about Mozilla due to the open
source and various "usability" bugs that I have already found. If the code
is wide open, what is stopping it from being vulnerable to hackers? As for
Opera, not sure I could convince management to buy it when there are free
alternatives. Then there's the problem of all the various corporate web
apps in use that only support IE, making it the lame duck browser, if you
will. So I need lots of ammo to shoot that duck out of the sky.
The new browser war is here, commence firing!!