While using improper usenet message composition style by top-posting and
unnecessarily said:
Fact is that *every* Windows OS MS has made has been on the life-
sustaining drip (currently known under the name "patch tuesday")
for its whole lifetime.
The regular monthly patch cycle did not exist until probably 2004 (or
SP-XP2?). Windows 9x/me did not experience anything like "patch
tuesday" during their life cycle.
In other words: *all* of them exist under a persistant threat.
When MS stopped supporting Win-98 in July 2006, there was a grand total
of 33 security issues that had been identified during it's 7-year
lifespan:
=======================
Vulnerability Report: Microsoft Windows 98 Second Edition:
http://secunia.com/advisories/product/13/?task=advisories
Affected By:
33 Secunia advisories
22 Vulnerabilities
Unpatched:
9% (3 of 33 Secunia advisories)
Most Critical Unpatched:
The most severe unpatched Secunia advisory affecting Microsoft Windows
98 Second Edition, with all vendor patches applied, is rated Less
critical.
=======================
Now compare that to the most current (and probably very close to the
final tally):
Vulnerability Report: Microsoft Windows XP Professional:
========================
http://secunia.com/advisories/product/22/?task=advisories
Affected By:
446 Secunia advisories
668 Vulnerabilities
Unpatched:
10% (44 of 446 Secunia advisories)
Most Critical Unpatched: The most severe unpatched Secunia advisory
affecting Microsoft Windows XP Professional, with all vendor patches
applied, is rated Highly critical.
========================
Over the past year, the number of "Secunia" advisories for XP has been
increasing at the rate of about 2.5 per month, and the number of
vulnerabilities has been increasing at the rate of 7 per month. In Dec
2012 there was 44 unpatched vulnerabilities. That number hasn't changed
in 15 months.
The truth is that Win-9x/me has alway been harder to break into from a
remote access point vs the NT line (2k/XP etc). The term "internet
survival time" was coined as a way to measure how long it would take for
fresh install of win-2k or XP-SP0/1 to be hacked by a worm when the
computer was directly connected to the internet for the first time (with
no firewall or nat-router).
Typically, back in 2001 to 2004 your win-2k or XP system with a fresh
install would be hacked in 10 to 20 minutes - with no user intervention
or action required! In fact, unless you were behind a nat-router (which
was a new concept for residential DSL connections back 10+ years ago)
you had a hard time performing your first on-line update before your
system was hit by a network worm.
Win-9x/me was, either by design or "dumb luck", a far less vulnerable OS
in terms of it being made to reliably be tripped up by exploit code
(heap spray, buffer-over-run exploits) than the NT line. 9x/me was
never vulnerable to network worms the way NT was - because of all the
open ports and services that OS's like 2K and XP turn on by default. In
fact, the default setting for file and print sharing is enabled for XP,
but is disabled for 9x/me.
The "security" concept that is frequently mentioned with 9x vs NT is the
idea of being able to control what the local user can do with the
system, and it is true that the local user sitting at the 9x/me keyboard
has access to the entire system (all files, registry, etc).
But in terms of internet security and exposing a system to remote
exploit code, the NT line fell far short of being as invulnerable to
such exploit paths as 9x/me was, and the Secunia numbers posted above
are perfect examples of that.
Granted, when now yet another security problem will be found for
XP it will be harder to get a fix for it. On the other hand,
you might see some "hackers" come up with them -- just like they
have done a few times in the past, way before MS came with their
own.
Patches for several components of IE6-sp1 which were made available for
Win-2K during Q3 and Q4 of 2006 were found to be compatible with
Win-9x/me. Both 9x and 2K shared the same version of IE at the end of
their life, and hence those files were operational under both OS's.
I fully expect that future patches for other system files made for Vista
and Seven will be tried on Win-XP by power-users and enthusiasts, and
you will probably be able to read about their efforts on the MSFN.org
message board because there is no similar, coordinated effort or depth
of user-knowledge for XP that exists on usenet.