Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Microsoft Fixes Critical SChannel & OLE Bugs, But No Patches For XP
Newest First  |  Oldest First  |  Threaded View
Page 1 / 3   >   >>
BlackWingCat
BlackWingCat,
User Rank: Apprentice
12/5/2014 | 1:23:53 AM
Re: XP
Therefore, I created MS14-064/066/067/068/070/072 patches for Windows 2000 myself in last month. :)

 It should be easy that created it from other version patches , because someone can create the malware from vulnerability within severaldays.

 
Technocrati
Technocrati,
User Rank: Ninja
11/28/2014 | 6:43:53 PM
Re: XP

@DDURBIN1     I love the analogy !   I couldn't agree more.

ODA155
ODA155,
User Rank: Ninja
11/20/2014 | 10:00:24 AM
Re: XP
Did they fix it for free?
DDURBIN1
DDURBIN1,
User Rank: Apprentice
11/20/2014 | 9:50:54 AM
Re: XP
If I owned a 2006 Ford Mustang (you could buy XP new in 2006)) and took it to a Ford dealer for repair do you think Ford would turn me away or do you think they would try and help a loyal customer out?  And if they refused to work on my 2006 (even though I'm willing to pay) then demand I buy a new Mustand from them do you think I would only look at Fords?
ODA155
ODA155,
User Rank: Ninja
11/20/2014 | 9:39:46 AM
Re: XP
@DDURBIN1, is this an aurgument for information security or are you just nostalgic for XP, because this has nothing to do with the "survival" of any company, but rather companies, IT Departments and private customers unwilling to upgrade to a supported operating system, and you don't have to, it's not required, but do not expect a vendor to keep a product alive if they want to produce something newer. Read this article, if you're willing to pay for it you could probably get them to enclude you in this program to keep XP going... but then you can also keep using it unsupported and hope for the best, it's your choice. In your opinion, how long should MS carry XP, 5 more years, 10, 25? Let me ask you this, how old is your cell phone, do you upgrade every two years or less? I know people who complain about no support for Windows XP but everytime a new Android or iPhone is released they get one, why, I don't know, don't care but it just makes me laugh when I compare the two actions, they make no sense.

Speaking of Ford, have you ever driven an original 5.0 Mustang, a Torino or a Toyota Supra or what about the old big bodied Cadi's... they're all gone, for what their makers thought\hoped would be better products. Things change

http://www.pcworld.com/article/2139929/windows-xp-support-will-be-available-after-april-8-just-not-for-you.html

 
DDURBIN1
DDURBIN1,
User Rank: Apprentice
11/20/2014 | 9:19:32 AM
Re: XP
@ODA155, name ANY company that survives after rejecting 30% of its customers.  Can you image let say McDonald's, AT&T or FORD rejecting 30% of the customers that come in their stores?  This is what Microsoft is doing; turning their back on "loyal" customers.  It is not the best business practice.  This is a customer decision (for whatever the reasons might be) not a vendor one.  Showing no good will toward continued XP customers leaves a poor taste particularly when 90% of the code in Windows 7 is actually XP code.

 
ODA155
ODA155,
User Rank: Ninja
11/19/2014 | 10:07:57 PM
Re: XP
@DDURBIN1,... I don't understand why people just can't move on to newer technology. MS made this decision a long time ago but kept putting it off because of customer outcry... should MS provide patches and support for all of its "unsupported" products...? How long should a warranty last last on a car that you bought in 1992, because you like it and want to keep it, should the automaker be forced to keep updating it because you like it,come on people, should MS support Windows 2000 or NT4.0?

You want to know why 30% of the worlds computers are still running on Windows XP... it's because somebody, for whatever the reason(s) were made a decision not to upgrade, not because of anything MS did because if that were the case that 30% would be lower since support ended on May 1st, and as an information security professional I have no sympathy for anyone or company still using it... even the company I work for.
Technocrati
Technocrati,
User Rank: Ninja
11/17/2014 | 1:44:12 PM
Re: The same code base?

@Marilyn Cohodas   Thanks for the link - I didn't know Mr. Nedella came from Sun ?     Seems as though everyone from the early days of Sun have done well afterward.   I do wish him good luck though, managing the likes of MS will be no easy task.

Technocrati
Technocrati,
User Rank: Ninja
11/17/2014 | 1:40:18 PM
Re: The same code base?

@Robert McDougal  -    Good point.   The computing world was much different then and I agree those methods of yore would not pass the mustard now. 

Robert McDougal
Robert McDougal,
User Rank: Ninja
11/17/2014 | 1:17:46 PM
Re: The same code base?
@Technocrati   If I was in the shoes of Gates and Ballmer I would probably have decided to code on top of what was already there.  However, that was then, in the security environment of today I think I would have made a different decision.  Today, the cost of a security flaw to the business and the brand name is much more than it was even 5 years ago.  It probably makes more economical sense to re-code from the ground up now.
Page 1 / 3   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file