Microsoft Security Bulletin MS03-040 - 828750

  • Thread starter Thread starter Jerry Bryant [MSFT]
  • Start date Start date
George (Bindar Dundat) said:
Now there is the right solution. "Forced" updates. But look at all the
resistance to that concept. It would solve the problem. There would not have
to be any early notification that could tip someone off to the vulnerability.
MS could simply write the patch and force the download. I can hear all the
privacy advocates now, but it is the ultimate answer.

I don't know about that being a privacy issue, but it does give MS just a
little more power in information hiding. Besides the big-brother aspect of
something like that, and what a corporation could do with that kind of power,
(think about it. They would "own" your system) what happens when "code of the
day" (to borrow a phrase) is buggy? Sit back and wait for the forced fix? Of
course that's assuming the original forced patch didn't break Windows to the
point it won't boot, or mabey your internet connection..

I vote Nay..
(free-will advocate)
 
Me2 said:
Your arguments are biased to protect Microsoft's assets, not yours or
the company you work for.

I diagree, and that's the first thing you've said that offends me because it
insults my dutifulness to my employer.

They are entirely consistent with the well-being of the company I work for.
The company is very much behind the idea that they don't want information
circulated before there is a fix, and that they rely on a multi-layered
approach to security. With firewall and updated antivirus software in place,
these are the points of view that lead to the *most* security.
If a new worm/virus is starting to infect machines across the world -
spewing out your personal documents as spam or deleting hard drives -
and your company happens to be one of the first to be targeted. What
do you do?

If you are the *first* hit? First, that's rare -- well beyond one in a
million. But it's a reasonable question, I guess.

Again, the multilayered approach covers it as well as anything can cover it.
Even the prior information for which you are lobbying wouldn't provide us
more protection because the information wouldn't be specific to a particular
assault.
Jim might say: "...the moment a new Critical Update
appears there is a rapid move to deploy it on the servers, and then
turn to the question of whether or to inform the end-users. By that
time there is pretty much always an updated virus definition file
from our AV provider..." Excuse me? What? --- No, that's not what
you would do. You would want to know RIGHT NOW how to prevent
infection/replication, pull the plug on the servers, or get the fire
ax and cut the ISP cable.

And you *do* know how to do that, right? Your network people know how to
slam your own gates shut on no notice, right? Hm?
And if we have this drummed in "Microsoft is special - they should say
nothing" convention - Microsoft will be telling you - nothing. How
nice.

<sigh> No. They're just the wrong entity to be doing this. They should be
(and are) communicating with those who should be the FIRST place you look
for that kind of protection.
In the mean time you are scrambling to get information from your AV
provider - who does not have a scan for the bug yet - in fact you are
one of the first to report the bug. What do you do? There are some
newsgroups...

You earn your pay and manage the incident using the tools you have rather
than looking for someone to blame who couldn't have provided you with
advanced protection anyway. And yes, you get this stuff to your AV provider
immediately, to help in the process of getting the real fix out the door as
fast as possible.
In one hour, 10% of Jim's 6000 machines have already been infected.

Yes, but *one* change at the network administration level shuts the gates,
so 1 or 600 makes no difference; and, once the AV patch is deployed, the
matter is essentially a dead one.
Jim's managers say "Stop this thing now!" The AV
vendor is working on a scan/repair tool. So you call Microsoft,

That's your first mistake. Wrong call. They aren't (yet) in the antivirus
business. Call your AV provider instead. They *are* in the AV business. You
blew it. (Call MS *second* because they may actually have people hustling to
work on it regardless.)
they don't even post the fact that the patch was
rushed out to address the worm that hit Jim's company.

BTW, it didn't hit our company. ;) (Not this time, at least.)
At this point Jim is saying "WHAT! Microsoft knew about the
vulnerability and how to mitigate it by shutting down the browser
service and did not tell us that!!! What gall!!" Jim louses his job
- But Microsoft did the right thing by saying nothing. How nice for
Microsoft sales...

You write excellent pulp fiction or the overly sensational and bombastic
type.

--
Jim Eshelman, MS-MVP Windows
http://aumha.org/
http://WinSupportCenter.com/

Did you find this newsgroup on the web? A newsreader like Outlook Express wi
ll make your online life a lot easier. Get better help! See:
http://aumha.org/win4/supp1b.htm and
http://support.microsoft.com/support/news/howto/default.asp
 
You bet, free will is the way to have it Bill, but we are now at the point of
considering what is best for the masses. I feel like a politician making a
decision on a tax increase here. Fortunately I won't have to make the call.
From Microsoft's perspective it would have to be a "Damned if you do, Damned if
you don't" situation. What is ideal for you and I isn't necessarily going to be
what is best for the average user. What other choices are there? Licensing
computer users? Try and get that passed into law and even then there would be
people who would not conform. Stronger international laws and better tracing
methods would be a step in the right direction. Extremely tough sentencing of
those that are caught should be in there and the sentences should be equalized
on a global basis. You could consider sentencing under national security laws.
After all a virus or any major exploit has the potential of bringing a counties
economy to it's knees and the sentencing should reflect that. Probably, as much
as you and I would not like the loss of freedom, forced updates would be the
answer which was easiest to implement and would have the highest impact on the
problem. There has already been rumors of MS implementing this in the newer OS
platforms. When people don't keep their systems updated, who takes the blame
for it? Microsoft does, and if they are the ones that are getting hammered at
by the user, who has a better right to make this type of decision, as unpopular
as it would be?

--
George (Bindar Dundat ©) MS-MVP
This information is provided "AS IS"
It may even be wrong!
For Windows Troubleshooting Tips see;
9x/ME http://aumha.org/win4/a/tshoot.htm
2000/XP http://aumha.org/win5/a/tshoot.htm
|
| > Now there is the right solution. "Forced" updates. But look at all the
| > resistance to that concept. It would solve the problem. There would not
have
| > to be any early notification that could tip someone off to the
vulnerability.
| > MS could simply write the patch and force the download. I can hear all the
| > privacy advocates now, but it is the ultimate answer.
|
| I don't know about that being a privacy issue, but it does give MS just a
| little more power in information hiding. Besides the big-brother aspect of
| something like that, and what a corporation could do with that kind of power,
| (think about it. They would "own" your system) what happens when "code of the
| day" (to borrow a phrase) is buggy? Sit back and wait for the forced fix? Of
| course that's assuming the original forced patch didn't break Windows to the
| point it won't boot, or mabey your internet connection..
|
| I vote Nay..
| (free-will advocate)
|
|
|
 
cquirke (MVP Win9x) said:
The dice are wieghted against us there, and that's why I suggest
looking at ways to fix this now - while the need is not quite obvious
and before a crisis has everyone asking why we dropped the ball.

Always the best approach! I agree with that principle whole-heartedly.
Meantime I believe it's prodent to mention crude steps that will
mitigate - such as a reminder that allowing scripts to run without
prompting is in fact conferring programming rights to every web site
you visit (or get re-directed to), etc.

That's a difficult choice sometimes. Many (hardly all, but many) of the
MS-originated vulnerabilities are because conveying great capacity also
creates great exploits. The classic, of course, is the case of Office macro
virues. These wouldn't have arisen except that MS provided in Office a macro
language that is pretty much able to run the entire operating system. I have
no comfortable solution to the trade off, since "give the user less power"
usually isn't a good solution. Users want more capacity, and blast Microsoft
for withholding control and flexibility -- but when these are given, a new
door is opened for exploitation.

I've never considered disabling scripts a valid solution. I rely on their
execution too often. In many enterprise situations, this is a main way that
IT management has to deliver forced patches, repairs, and configurations on
machines enterprise-wide. Rather, other kinds of protection have to be
substituted usually, not the least of which is adequate bidirectional
firewall protection. This, of course, isn't a perfect solution either.
This is all the old "security by obscurity" debate, which IMO is a
tautology. All security is by obscurity, but what you want is an
obscurity so dense that the strongest computational power cannot break
through within the time frame that the security is to work.

Arm-wrestling always invites a stronger arm to enter the contest. That turns
it into a non-stop rat-race. 128-bit encryption was illegal to export for
"national security" reasons... until the U.S. government bought enough extra
computers to brute-force decode it. Then they no longer considered it a
threat.
His mistake was to get too specific - he saw IP-spoofing as the great
satan, and dwelled too much on that (incidentally, note that malware
mail tracking pivots on IP address as From: and ReplyTo: etc. can be
assumed to be spoofed. Join the three dots...)

That became Steve's loudest cry... but you have to read the whole of what he
wrote. Bottom line, he held that full sockets implementation was wrong. He
was right. Microsoft's answer was to say that the focus should be on keeping
invaders from hitting the system in the first place, hence the Windows XP
native firewall, so they saw no reason not to implement the full standard.
IMO they were wrong.
I've been worried about NTFS becoming a fire hazard, like that
sweatshop that incinerated a number of garment workers as the fire
escapes had been locked by management to stop them "goofing off".

I'll leave your further education on this to Walter. said:
The trend started with whacking av and spoofing the exefile
association, and it's broadening out to include RegEdit etc.

Yes! This is scary stuff. I've watched AV programs be deleted off of a
system (files vanishing in Explorer) faster than they could be installed.
It's getting to where the only recovery is going to be frequent backups
(preferably by imaging), and wipe-then-restore as a recovery. (Funny how
history loops around like that.)
 
Free-will issues are handled by making the default "ask me first," and a
user option at any point to turn it fully on ("update without asking me, but
notify me afterwards"), query ("ask me first"), or off ("don't even try
it!) -- just like Windows Update has become.
 
"cquirke (MVP Win9x)" <[email protected]> wrote

Sorry this is long - some nuances may be lost if I oversnip the quotes
Always the best approach! I agree with that principle whole-heartedly.

No, the DoS effect is no more manageable by other means just because
risk management (patch) isn't available :-)

That's the same logic as "if I have zero RAM my system would be really
fast, because zero RAM needs no swap and there'd be no swapping to HD"

Or "feature A is weak on problem X, but that's OK because it's better
at handling problem Y" {e.g. NTFS, bad hardware, rollback}

IKWYM, but in the absence of a surgical fix, you have to be able to
damage-control through bulkheads. If that is not possible, then you
have a bad design on your hands... any functionalities that can't be
hidden from the world or bulkheaded off have to be 100% COAB
bullet-proof, i.e. out of today's "patch it later" approach. Better
to design in such a way so that no code ever has to be that good.
That's a difficult choice sometimes. Many (hardly all, but many) of the
MS-originated vulnerabilities are because conveying great capacity also
creates great exploits. The classic, of course, is the case of Office macro
virues. These wouldn't have arisen except that MS provided in Office a macro
language that is pretty much able to run the entire operating system.

That's not the point of failure. The point of failure was giving
"data" any auto-executing programming rights whatsoever.

Exploit opportunities fall into three categories:

1) Those relying entirely on SE (Social Engineering)
2) Those that leverage bad software design
3) Those that leverage bad software coding

What is "bad software design"? Anything that facilitates attack not
dependent on SE - i.e. the definition is circular.

What is "bad software coding"? Coding that creates attack
opportunities unintended by design.

Vendors can disclaim responsability for (1), but not (2) or (3). If
MS wishes to reduce their responsibilities (and hell, I would - a
massive legal takedown is the only real threat MS has) then they'd do
well to design prudently to avoid (2), knowing that (3) is a problem
that will not go away completely.

IMO, risk management should go beyond patching, as patching only
addresses (3) but does nothing for (2). Often risk-managing (2)
modifies or removes the need for (3), and in the cases we were
discussing - where an exploiter predates the fix - it's all you have.


For example, being able to run scripts within cookies as "local HD
zone" is described by MS as (3). I would cite allowing scripts within
cookies at all as a case of (2).

For example, being able to automate cetratin controls from within
scripts embedded in email "message text" is described by MS as (3). I
would cite allowing scripts to auto-run in "message text" as (2).

For example, Office macro and VBA malware may extend due to particular
coding holes that are documented as (3). I would consider the notion
of assigning any sort of programming rights to "data files" as (2).
no comfortable solution to the trade off, since "give the user less power"
usually isn't a good solution. Users want more capacity, and blast Microsoft
for withholding control and flexibility -- but when these are given, a new
door is opened for exploitation.

It's not about "power". Power to whom? The user, or whoever has the
skills to attack the user? How many users ever write scripts, or ever
see scripts other than malware?

It's about risk expectations. A user may choose to read a data file
or email message, but doesn't expect to have conferred programming
rights to this material. In a sense, you could file this as "bad UI".

The industry has evolved a good layered UI, and much of that credit
goes to MS. Features of this UI are...
- common tasks are easy to do
- dangerous tasks prompt for confirmation
- you can find obscure tasks by clicking through menus
- you can shortcut common tasks you know via shortcut keys

IOW, when you look at something, your intuition as to how to do it is
usually on track - and so is your intuition as to what will happen
when you go ahead. When there may be unforseen consequences, you are
prompted, e.g. "Do you really want to wipe all files off C:?"

This is known as WYSIWYG, and it fails *badly* when it comes to risk.

Most computer concepts are expressed as metaphors that are already
familiar to the user, e.g. "desktop", "folder" and so on - everything
they already know about these concepts applies to the computer
equivalent, and if the analogy is accurate, there's no further
understanding required. That's what makes computers "easy".

When it comes to security (or even basic safety), NT brings a model
that assumes you are a professional system administrator. After all,
the "home" market is just the same as "corporate" but thinner, right?

So everything the user already knows about security - which revolves
around physical access - is badly mismatched to what they need to
know. In effect, they have to pretend to be a corporation with a boss
or administrator, and everyone else as dumb users who can't be trusted
with sharp objects. There are more specific flaws in the way MS has
delivered user account rights etc. but that's another story.

I suspect MS goes too far to appease "business partners" who want to
manipulate user systems from web sites etc. to be considered healthy
or appropriate by most consumers. There's also much pandering to
corporate business needs within what is ostensibly the OS they are not
supposed to be using (XP Home), and finally there's the fear of DRM,
i.e. that your computer will act against you to preserve the rights of
not only MS (WPA) but assorted media pimp cronies.

What this does is FUD up the waters, so that a significant number of
users will always avoid patches for fear of intrusive side-effects.
That's why infosphere infectability will remain so high.
I've never considered disabling scripts a valid solution. I rely on their
execution too often.

As you say, one takes a choice - so far I've chosen to avoid scripting
and use .bat instead (one extension, only two interpreters, no risk of
..bat being embedded in "data" files such as HTML).

I'll use scripting when I figure it out (heh heh) and when I need to
do things that .bat can't do (that will be soon). However I'd either
toggle scripting so it can be turned off when I'm done, or I would
"privatize" it if possible via non-standard extensions and engine
names, etc. so that arbitrary scripts would fail.
In many enterprise situations, this is a main way that IT
management has to deliver forced patches, repairs, and
configurations on machines enterprise-wide.

Sure - but these are the dudes who are supposed to be using XP Pro,
right? I can understand MS being too timid to push the point when
Win95 came out, as the success of Win95 wasn't assured and besides,
the NT of the day still had the Win3.yuk UI (having the corporate
market remain standardised on the old UI would have been Bad).

But now, the time to subject the home market to risks associated with
the corporate model just so businesses can save a buck is past. The
impact of consumer PCs on the infosphere is non-trivial in a world of
broadband; a more appropriate and intuitive security model is needed
for that market, even if that means business has to pay for Pro.

That would be a win-win for everyone:
- home users get a model they already understand
- business saves on the impact of malware'd home systems

Instead of Home being resented as an artificially stunted Pro, it
becomes genuinely better value for that market.

And what business spends up on Pro, they save on reduced malware
impact - the bulk of attacks from infected PCs is avoided in consumer
PCs on broadband is structurally immune to infection.
Arm-wrestling always invites a stronger arm to enter the contest.

Exactly. Better to lock out the bad guys than let everyone in and
rely on the bouncers to spot and throw out troublemakers.


Users know that "home" means "a physical place where safety can be
assumed". They know it may be safe to speak to strangers through a
locked door, but less so to invite them in. They lock up the PC when
away so that unathorised ppl can't access it - and there is NO-ONE
outside the house whose rights to the PC exceeds theirs.

Use that common sense as the basis for XP Home's security model - chop
out all the corporate stuff that allows a notional "administrator"
anywhere in the world to override the user's rights - held at bay only
by a password system that users can't be bothered with and which is in
any case quite porous (pasword cracks, leakage out of user zones)

Most users see the Internet as a place to consume, i.e. they choose
to visit sites, read stuff and so on as if they were watching a movie
or reading a book. No-one expects the characters on the screen to
jump out and shoot you, or an arm to reach out of a book and stab you
in the chest - why should web sites be allowed to program the user's
PC as a matter of course?
I'll leave your further education on this to Walter. <vbg>

No please anything but that :-)

Certainly, my experience with a Swen infection on NTFS was *exactly*
that - I had to blindly rely on toolls running head-to-head with
active Swen to kill it, all the while being unable to be sure other
undetected malware weren't also running (Swen had killed the av, so
who knows what else may have come in).

If the user asks "is the PC clean now?" I'll have to shrug and say
"it's either clean, or there is active malware that is successfully
hiding from av". The latter statement is always true of course, but
how much more so when you know your attempts to get your av airborne
and detecting malware are done while any active malware is already
airborne and can be dodging or dropping bombs on the runway.

NTFS is *exactly* like a hi-rise with no fire escape.
Yes! This is scary stuff. I've watched AV programs be deleted off of a
system (files vanishing in Explorer) faster than they could be installed.

Yep. This is all entirely predictable from basic theory (even if it's
my own theory - with no formal training I have no idea as to how it
Venns with what is taught as computer science, but to me it's just
common sense). I'd rather have been wrong on this, but if it wasn't
now, it would have been later IMO.
It's getting to where the only recovery is going to be frequent backups
(preferably by imaging), and wipe-then-restore as a recovery. (Funny how
history loops around like that.)

That's a disaster for a number of ways - even if it works (hint;
what's the half-life of an unpatched system during a worm war?) it's
an unacceptable result, especially for an OS touted as "better".

There will always be collateral damage and productivity impact.

Somewhere in another post (this thread or another) I covered the
problems inherent in backup - negative timelines, scope boundries.

Right now, NT on NTFS is a very precarious situation where malware is
concerned, and I still consider it unfit for general home use.


------------------------------------ ---- --- -- - - - -
Malware coders are the Wild Weasels
of Microsoft Quality Assurance
 
On Tue, 7 Oct 2003 15:28:49 -0700, "George \(Bindar Dundat\)"
Now there is the right solution. "Forced" updates. But look at all the
resistance to that concept. It would solve the problem. There would not have
to be any early notification that could tip someone off to the vulnerability.
MS could simply write the patch and force the download. I can hear all the
privacy advocates now, but it is the ultimate answer.

Perhaps an answer to an artificially-contrived question?

I've lived through a regime that did exactly that - engineered a
crisis to legitimize extreme measures to curb it. Measures that just
happen to ride roughshod over civil rights and serve to entrench the
regime, gratefully accepted (by an enranchised minority) as the
necessary cost of safety.

Product defects get leveraged to entrench vendor interests.

Leaving the politics aside (but if you snooze, you lose), the fact
remains that several patches have broken stuff. How much more likely
would legal repercussions be if a vendor forced new code onto user
systems that broke them? How much greater the impact if all systems
all over the world were affected at the same time? How would this
mess be rectified if those PCs lost all connection with the internet?

Those are large dice to roll - I'd rather move to another table and
play some other game, myself :-)


------------------ ----- ---- --- -- - - - -
The rights you save may be your own
 
I agree that their hand may be forced, but I'm not sure that "forced"
updates is attractive even to MS. (though in a perfect world it could be)
Considering the inevitable "bug in a patch" or a "killer virus",, if MS is
pushing updates, and there is no choice to update or not, won't this
make them more liable, and not less. True, everybody would be
"up to date - all the time", but something will eventually break.


George (Bindar Dundat) said:
From Microsoft's perspective it would have to be a "Damned if you do, Damned if
you don't" situation. What is ideal for you and I isn't necessarily going to be
what is best for the average user. What other choices are there?

When people don't keep their systems updated, who takes the blame
for it? Microsoft does, and if they are the ones that are getting hammered at
by the user, who has a better right to make this type of decision, as unpopular
as it would be?

--
 
Whoever,

whoever said:
You seem to refuse to seperate the issues of viruses (that typically DON'T
target an OS vulnerability), and worms like Blaster that do.

Who cares what the heck the technical details are - the end result is the
same. The virus, worm, trojan or XYZ rogue program (what ever we call it
and however it does its work) are all taking over the machine - many are
being "nice" right now - but they don't need to be.
If the problem isn't caused by a software exploit, then that seems like an
appropriate response to me.

In my example scenario it WAS caused by a software exploit and Microsoft
knew about it - but they were delaying (allowing Jim's company and others to
suffer the consequences) so that Microsoft could be the "patch saviors" and
release the info when they were ready. (Remember Microsoft shouldn't be
seen talking about the virus/worms/Trojans effecting their products? - it
would be bad for sales...)
Microsoft don't release patches for viruses like SoBig and Swen, because
they don't rely on software bugs to propogate. I don't know if you are
simply incapable of understanding the distinction, or if you're
deliberately confusing the issue by mixing these two scenarios up.

First of all blaster was "nice" in that it could have had an SMTP engine and
other nasty stuff. My example scenario is built after I experienced a
similar situation with qhosts - a Microsoft software "object tag" bug. The
example scenario also uses a software bug to propagate. The qhosts trojan
could have been much worst - I don't think people get it!!!

SoBig and Swen are a wider problem - but they are still targeting Microsoft
products. Microsoft needs to respond.
Microsoft published a security bulletin and patch for the RPC vulnerability
on July 16th. Blaster appeared on the scene about 3 weeks later. People who
had applied the July 16th pathc weren't affected.

Yes, advanced notice is good - for the security of MY information and the
information I am trusted to protect. I wonder what your tune would be if
YOU were *one of the first few thousand* to be infected with a really nasty
bug that Microsoft knew about. "Oh - its ok if we were wiped out -
Microsoft needed to protect the stupid - and you know - it would have made
them look bad to be talking about a virus that is enabled by their
products..."

Me out
 
Jim,

I do not mean to insult you personally. I am sure that you take your and
your company's security very seriously (it's obvious from your posts). I
would think that you are doing the best possible job in light of these
"Trojan/virus/worm wars" we seem to find ourselves in.

I take information security very seriously also. Mostly I am ranting
because we experienced a (admittedly very small non-damaging) breach from
qhosts. The thoughts are flowing out and I am venting. It seems Microsoft
is skewing the arguments and many soak up their words without thinking (I am
guilty of this).

<begin soapbox arguements>

Jim Eshelman said:
I diagree, and that's the first thing you've said that offends me because it
insults my dutifulness to my employer.

They are entirely consistent with the well-being of the company I work for.
The company is very much behind the idea that they don't want information
circulated before there is a fix, and that they rely on a multi-layered
approach to security. With firewall and updated antivirus software in place,
these are the points of view that lead to the *most* security.

I would think that YOUR company wants to know about potential problems as
soon as possible - before it becomes a real problem - event if this means
that some OTHER company has to suffer for not preparing for the problem.
This is not possible by *only* relying on an AV vendor to notify you about
Microsoft's problems.
If you are the *first* hit? First, that's rare -- well beyond one in a
million. But it's a reasonable question, I guess.

You *only* need to be in first *few thousand* to be considered first! By
Microsoft anyway.
Again, the multilayered approach covers it as well as anything can cover it.
Even the prior information for which you are lobbying wouldn't provide us
more protection because the information wouldn't be specific to a particular
assault.

I am only "lobbying" to know about vulnerabilities that are ACTIVELY being
exploited like the "object tag" was! - beginning weeks before the MS03-040
patch was released!!! And I can tell you that I would have been prepared.
And you *do* know how to do that, right? Your network people know how to
slam your own gates shut on no notice, right? Hm?

Yes we do, we have it written down - remember worms/viruses have been around
for a long time, you should know how to do this also. I'm sure Microsoft
knows how to shut their gates. Is it better to have some down time or let
the life blood of you company flow out the cable? Firewalls mostly work
like one-way valves - your informaiton can flood out.
<sigh> No. They're just the wrong entity to be doing this. They should be
(and are) communicating with those who should be the FIRST place you look
for that kind of protection.

The AV vendors DO NOT provide protection from new treats. Microsoft DOES
NOT provide protection from new treats. YOU provide the protection and you
need to find out as much as possible as soon as possible. Who else do you
call other than Microsoft - the manuafure of the product that is haveing a
problem?
You earn your pay and manage the incident using the tools you have rather
than looking for someone to blame who couldn't have provided you with
advanced protection anyway. And yes, you get this stuff to your AV provider
immediately, to help in the process of getting the real fix out the door as
fast as possible.

Yes, there are many avenues of defense. Why leave Microsoft off the list?

Yes, but *one* change at the network administration level shuts the gates,
so 1 or 600 makes no difference; and, once the AV patch is deployed, the
matter is essentially a dead one.

Yes, this is where the "shut the gates" order goes out! But maybe your hard
drives are disappearing...
That's your first mistake. Wrong call. They aren't (yet) in the antivirus
business. Call your AV provider instead. They *are* in the AV business. You
blew it. (Call MS *second* because they may actually have people hustling to
work on it regardless.)

In this scenario (which is kind of like what I experienced with qhosts in
real life) we call Microsoft second. (The statement above about the drummed
in "Microsoft is special - they should say nothing" convention was to set
the stage for how they would react to your call - even after you had called
the AV vendor first.)
BTW, it didn't hit our company. ;) (Not this time, at least.)


You write excellent pulp fiction or the overly sensational and bombastic
type.

I am only blurting what comes to mind. I take it personally when my
security is breached, even in a very small way. It could have been much
worse. I do not relish what is coming. Do we need a 9/11 in the computer
world to wake up to this mess?
 
Sandi,

What if the thieves are ALREADY walking around with the special key that
takes advantage of the defect? The thieves are telling their friends, and
they *only* have broken into10000 houses...

So in this case the manufacture is keeping the information about the defect
secret, to protect whom?

Me out
 
It is definitely not without risk Bill, and I agree that it is probably not all
that attractive to MS. OTH they may have no recourse. People have been blaming
their own incompetence on MS for so long that it has become (unfortunately)
necessary for MS to look at other options. People seldom wish to take the blame
for their own ineptitude or their lack of appropriate action so they shift the
focus to the easiest target (in this case Microsoft). After it reaches a
certain point, that target will begin to fight back and the results are not
always what people want or expect. It's the old schoolyard bully vs. the
pacifist thing again. Look out when the pacifist reaches the breaking point,
nasty things can begin to happen.
It is the users that have forced many of the things that we now whine about.
Case in point, the death of Windows 98. A large amount of that is because it
was never designed as a secure system, and there is no reason that it should
have been. When 98 was undergoing development we did not have the security
issues that we face today. If it was not for that issue, MS would have been
able to add most of what is available in XP into 98 (and what a great OS that
would have become). By the way, it's my feeling, that no matter how secure a OS
is designed and no matter what steps MS or any other developers take, someone
will circumvent it and in most cases they will do that by exploiting the holes
that users have left in their systems. Again the fault lies with the user and
not the developer, but who will take the blame? (HINT: Re-read the first
paragraph).

--
George (Bindar Dundat ©) MS-MVP
This information is provided "AS IS"
It may even be wrong!
For Windows Troubleshooting Tips see;
9x/ME http://aumha.org/win4/a/tshoot.htm
2000/XP http://aumha.org/win5/a/tshoot.htm
| I agree that their hand may be forced, but I'm not sure that "forced"
| updates is attractive even to MS. (though in a perfect world it could be)
| Considering the inevitable "bug in a patch" or a "killer virus",, if MS is
| pushing updates, and there is no choice to update or not, won't this
| make them more liable, and not less. True, everybody would be
| "up to date - all the time", but something will eventually break.
|
|
|
| > From Microsoft's perspective it would have to be a "Damned if you do, Damned
if
| > you don't" situation. What is ideal for you and I isn't necessarily going
to be
| > what is best for the average user. What other choices are there?
|
| >....
|
| > When people don't keep their systems updated, who takes the blame
| > for it? Microsoft does, and if they are the ones that are getting hammered
at
| > by the user, who has a better right to make this type of decision, as
unpopular
| > as it would be?
| >
| > --
|
| > | > |
|
| > | ...what happens when "code of the
| > | day" (to borrow a phrase) is buggy? Sit back and wait for the forced fix?
Of
| > | course that's assuming the original forced patch didn't break Windows to
the
| > | point it won't boot, or mabey your internet connection..
|
|
|
 
Jim Eshelman said:
That's an old model. I'm not talking about that sort of reminder but,
rather, the kind of feature that at least Norton (and I'm sure others) has
had for at least a couple of years -- where it automatically checks for
updates everytime you go online. No setting it for "check every 3 days."
Some weeks I get more-than-daily updates. Some weeks, only one. But the
channel needs to push them through without user intervention.

A note of information from Symantec:

"How often are virus definitions posted?"
"During "non-alert" situations, Symantec Security Response posts virus
definitions to the LiveUpdate servers *once per week* (usually Wednesdays).
However, during "alert" situations, virus definitions are posted to the
LiveUpdate servers as soon as they have completed full quality assurance
testing."

That weekly post lag for low distribution but nasty critters can cost you
(unneeded-ly so if the preventive measures were known). Or the lag between
alert and "soon as they have..." can be devastating for the unlucky first
few thousand.
 
Me2 said:
In my example scenario it WAS caused by a software exploit and
Microsoft knew about it - but they were delaying (allowing Jim's
company and others to suffer the consequences)

You writing fiction but not labelling it as such, so people don't have the
opportunity to appreciate the rich scope of your imagination.

For example, as written previously, we suffered no such consequences.

The main (first person) character in your fictional drama has started to
weaken as a character, though. He is becoming increasingly whiney and most
readers will probably begin to suspect that he doesn't really know anything
about securing systems and therefore got his ass handed to him after it was
passed through a meat grinder. Now, the actual meat grinder incident
probably would have really spiced up your fictional account and held
everybody's attention but, for your own reasons, you've chosen not to give
out those details. But the whiney character doesn't make a very good
protagonist, and I think you will have a weak ending.
so that Microsoft
could be the "patch saviors" and release the info when they were
ready. (Remember Microsoft shouldn't be seen talking about the
virus/worms/Trojans effecting their products? - it would be bad for
sales...)

Your villain is too sympathetic. Ah, I just realized, you're probably
planning a terribly clever twist here, where your mean old villain turns out
to be a hero -- you've just foreshadowed it, but not subtly enough IMHO.
Don't give it away so soon. But other than the blunt hand on foreshadowing,
you're doing a pretty good job of setting up for the preclimactic
flip-around where the increasingly sympathetic villain becomes the hero and
the whiney first-person character turns out to be primarily the witnessing
character, left in uncomprehending perplexity due to his antiheroic
shortcomings. It very well might yield to art! Keep at it.
"Oh - its ok if
we were wiped out - Microsoft needed to protect the stupid - and you
know - it would have made them look bad to be talking about a virus
that is enabled by their products..."

BTW, do you know about backups? You might be able to work them in there
somehow.
 
Me2 said:
I would think that YOUR company wants to know about potential
problems as soon as possible - before it becomes a real problem -
event if this means that some OTHER company has to suffer for not
preparing for the problem. This is not possible by *only* relying on
an AV vendor to notify you about Microsoft's problems.

Normal prudence seemed to cover it, since there were no reported instances
among a large user base.
I am only "lobbying" to know about vulnerabilities that are ACTIVELY
being exploited like the "object tag" was! - beginning weeks before
the MS03-040 patch was released!!! And I can tell you that I would
have been prepared.

Oh? What would you have done? Please be specific.
Yes we do, we have it written down - remember worms/viruses have been
around for a long time, you should know how to do this also. I'm
sure Microsoft knows how to shut their gates. Is it better to have
some down time or let the life blood of you company flow out the
cable? Firewalls mostly work like one-way valves - your informaiton
can flood out.

Firewalls should be two-way gates. Admittedly, this has limitations -- there
are things you can't routinely filter -- which is why a multi-layered
approach is necessary.

And sure, we'd like 100% uptime. But it isn't going to happen. Behind that
has to rest the readiness to move on short notice and start taking actions,
then recover in short order as needed.
The AV vendors DO NOT provide protection from new treats.

Yes they do -- usually in about 24 hours. Meantime, you have to manage your
system.

These incidents *will* occur. They are part of ordinary life, just like flu
season. Protection and recovery have to go hand in hand, and there will
sometimes be a little downtime. Nobody will be happy about the downtime,
just as nobody is happy about flu season. One simply has to be make those
incidents as few as possible and recover fully as quickly as possible.
Who else do you call other than Microsoft - the manuafure
of the product that is haveing a problem?

If someone breaches our front door at work, I don't call the door maker -- I
call our security chief! (I call the door maker the next day to get a
repaired door.) If someone breaches the OS or network, I don't call the OS
or network maker -- I call the company from which we get security support,
i.e., the AV company. (I call MS later, after we know that the AV company is
on top of things or getting there.) It's a matter of calling the right place
for the right thing at the right time.
Yes, there are many avenues of defense. Why leave Microsoft off the
list?

I don't leave them off. I just put them late on the list. And while I expect
them to be usually ahead of the curve on knowing something is going to
happen, I damn well don't want them broadcasting it to the general public
until they have a fix -- which is the one point from which this all began.
Yes, this is where the "shut the gates" order goes out! But maybe
your hard drives are disappearing...

Not if you have proper routine prophylaxis against data loss. Backup is your
friend!
I am only blurting what comes to mind.

That has become increasingly evident.
I take it personally when my
security is breached, even in a very small way.

Get over it.
Do we need a 9/11 in the computer world to wake up to this mess?

Get over it.
 
Get over it.

Yes, I agree.
Oh? What would you have done? Please be specific.

Possibly shutdown Internet browsing for the whole company! (From IE
anyways - but it would be very hard to isolate browsing to browsers other
than IE.) And warned all subsidiaries! Why? Because this HTML "object
tag" vulnerability had been bantered around since at least February 2002 -
see: GreyMagic Security Advisory GM#001-IE. AND it was *actively* being
exploited. The details are sketchie but the hackers were chipping away at
it. See the recent Symantec bug list.

Shutting down Internet browsing is not the end of the world for users - this
sometimes happens if the proxies have problems or there is some
office/infrastructure move going on.

Microsoft is allowed to be mute - and they want to move into datacenter
stuff?

Me out
 
Me2 said:
Possibly shutdown Internet browsing for the whole company!

See, for us, that's halting business altogether. There is almost nothing
that can be done in normal business with IE down. Even most of our custom
apps are web-based and only function in one or two specific versions of IE.
It's far better for productivity to take other routes.
And warned all subsidiaries!

What would you have told the general end-user in the field -- especially
those who were hired for skills other than IT-related skills -- that would
have been meaningful and practical without being alarmist.
Shutting down Internet browsing is not the end of the world for users

It is for us. Might as well all go home.

--
Jim Eshelman, MS-MVP Windows
http://aumha.org/
http://WinSupportCenter.com/

Did you find this newsgroup on the web? A newsreader like Outlook Express
will make your online life a lot easier. Get better help! See:
http://aumha.org/win4/supp1b.htm and
http://support.microsoft.com/support/news/howto/default.asp
 
Jim,

Your right. I did not spell out the fictional nature of the scenario I
drew - thought it would be obvious. I love science fiction and sometimes
the firewall in my mind breaks down - that darn buggie wetware.

Regards
 
Me2 said:
Jim,

Your right. I did not spell out the fictional nature of the scenario
I drew - thought it would be obvious. I love science fiction and
sometimes the firewall in my mind breaks down - that darn buggie
wetware.

<vbg>
 
Jim,

Jim Eshelman said:
See, for us, that's halting business altogether. There is almost nothing
that can be done in normal business with IE down. Even most of our custom
apps are web-based and only function in one or two specific versions of IE.
It's far better for productivity to take other routes.

We would still use IE internally - intranet apps reliy on it, yes. But
users could not check news on Yahoo or shop on Amazon... Maybe we would
setup a "Internet browsing room" for must do browsing. Allow browsing only
to specific trusted vendors/parterns, etc. There are lots of options.
What would you have told the general end-user in the field -- especially
those who were hired for skills other than IT-related skills -- that would
have been meaningful and practical without being alarmist.

Good question. Management needs to be fully involved and understand the
risks. Most users have somewhat a dim view of IT anyway so maybe it could
be chocked up to a bad device... you know how computers always have those
glitches... The proxy just would not work for a while...

But one day an "alarm" may need to be sounded! Terrorists are looking for
the easy targets, and the unaware...

Me, out
 
Back
Top