B
Bill Sanderson
http://www.microsoft.com/technet/security/bulletin/advance.mspx
Mike Nash's comments:
http://blogs.technet.com/msrc/
--
Mike Nash's comments:
http://blogs.technet.com/msrc/
--
OldBoy said:Yep, just got it
(Via Microsoft/Windows Update)
OldBoy
Bill Sanderson said:Great--I've been getting it on every machine I've tried so far. It's a quick patch--couple of minutes, perhaps even on a
dialup--reboot required, though.
--
Bill Sanderson said:
Anonymous Bob said:Now for an unsolicited opinion.<bEg>
Mr. Nash speaks of "customers" as if the corporate customer is the only
market that matters. I'm left with the feeling that consumers, such as
myself, are a secondary market. This fallacy here is that there is no such
demarcation in the real world. We all saw evidence of this in August when
the laptops of the on air personalities were spontaneously rebooting at
CNN
and ABC due to the Zotob worm.
When it comes to security, there can be no such demarcation. Let's leave
that to marketing.
Bill Sanderson said:I haven't read the links yet, but I've definitely given some thought and
voiced some opinion about the issues you are speaking of here. I don't
believe that division is there in Mike Nash's mind. I do believe that
Microsoft's view of their customer base is weighted towards the corporate
side--those are the folks who have direct support from Microsoft.
On the other side are: OneCare Live, Safety.live.com, and Spynet--although
Spynet has a fair number of corporate machines on it as well. Also the
feedback they get via calls to 1-866-pcsafety.
Plun has opined that Microsoft was saving possible headaches for the
corporate many via sacrificing a few folks with predilictions for unsavory
sites. I can agree that the wait while the patch was tested certainly had
that effect.
OTOH, if the patch turned out to be "bad"--a few thousand or tens of
thousands of individual customers are a much bigger problem than a few
thousand corporate desktops, in terms of correcting the issue.
I don't think that Microsoft intentionally has that divide in their
thinking--I do think that their "view" of the problem is necessarily biased
toward the large corporate customers of themselves and their antivirus
partners. I hope that they are doing what they can to correct that
imbalance, and I'll certainly talk about it when it seems appropriate.
A comment like that would be fair game for Mike Nash's next public security
chat.
January 11, 9:30 AM pacific time
http://www.microsoft.com/technet/community/chats/default.mspx
I've taken part in these chats, and the ordinary person off the street does
indeed have a chance to get a word in edgewise. You may not get the perfect
candid answer you aim for--but you'll get heard.
Anonymous Bob said:Thanks for the link and schedule, but I'd have to take a day off work. :-(
You make several good points and corporations will always and legitimately
have a larger voice. (Computer user groups...UNITE! <g>)
This exploit wasn't a bug. It was a feature that's been there for 15
years..
It didn't require a visit to the dark side. A visit to the Knoppix web
site
was enough:.
http://handlers.dshield.org/jullrich/wmffaq.htmls
Additionally, some printers were affected by the "fix". I believe it has
to
do with canceling a print job. It remains to be seen if there's still a
problem in that area, but I imagine there is.
Getting back to the point, corporate and home users face the same threat
environment.
Plun has opined that Microsoft was saving possible headaches for the
corporate many via sacrificing a few folks with predilictions for unsavory
sites. I can agree that the wait while the patch was tested certainly had
that effect.
plun said:What I meant was not "corporate headaches" beacuse of no patch, all
corporate networks probably was protected with both definitions and new
firewall rules, really small risk beacuse this was spread from Internets
cloak to unprotected small busines users/home users or bad protected
school users.
But the risk propagate when IRC bots was included ie a PC become a real
Zombie.
And a Zombie army is much more dangerous to deal with, they can fire a
"nuclear bomb" against anyone to destroy Internet structure.
Nevertheless I believe it was a small risk for something bigger.
We will see alot in future with Systemwarnings and Spyaxes........
but that Ewido wipes away and Smitrem.
It's clear that the folks behind this outbreak are dangerous and hard to
catch.
plun said:Bill Sanderson brought next idea :
Hi again
Yes they are, for example the URL I send to you and Andre
is registred in Russia.
But the registrant is in US.
This will be challenge and I believe if the worlds ISPs
tried even harder in cooperation with police to clean this mess
they will beat the bad guys hopefully.
regards
plun
Anonymous Bob said:There has to be a balance of freedom and responsibility. Certainly the
days
when computer crime was regarded as 13 year old kids having fun are gone.
What we're seeing now is serious and without a proactive response we could
loose the internet. I'm sure there are many who will say I'm overstating
or
exaggerating the problem, but the internet must survive as a *commercial*
medium. If it isn't a *trusted* medium its future is in doubt.