Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Problem With Patching: 7 Top Complaints
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
4/25/2016 | 10:41:19 AM
Re: Suggested errata/addendums
Flash is definitely a pain point, especially for vulnerability management. I agree with you 100% to remove it. Especially at the server level where it is really not needed.
MKultra
50%
50%
MKultra,
User Rank: Apprentice
4/24/2016 | 3:32:40 PM
patching - the never ending story ...
hi fans,

well, i think the problem is the following:

when you install all patches and updates, you will get only new problems with vulnerabilities ...

then you need another patch to fix it - and so on !!!

its a never ending race between patch-programmers and blackhat-hackers - and the hackers have gone to win ...

sincerly

                 dipl.-ing.matthias klein (ANONYMOUS-member ans cybersecurity professional)

 

ps: when you have any trouble with malware, dont hesitate to ask me for free advice: pls call my mobile         +49-1575/7719806 or send me an email to m.klein1959(at)yahoo.com !!! i will help you ASAP ...
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
4/23/2016 | 9:26:36 AM
Suggested errata/addendums
I'd add a couple things to this very well thought out list:

* Don't just test your Windows updates.  Have and utilize a testbed for ALL your updates.  You never know when something might not play nice with something else.  (Remember the 3-day outage Verizon had on accounts receivable -- prevent customers from paying their bills -- because of an update gone awry?)

* The real solution for Flash is to JUST GET RID OF IT.  ;)
<<   <   Page 2 / 2


More SolarWinds Attack Details Emerge
Kelly Jackson Higgins, Executive Editor at Dark Reading,  1/12/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).