Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:00 PM
George V. Hulme
George V. Hulme

Much Ado Over Microsoft's (Somewhat) Rare Out-Of-Band Patch

My advice: Patch this puppy, and don't worry about whether or not Microsoft should have published this update out of its normal monthly update cycle.

My advice: Patch this puppy, and don't worry about whether or not Microsoft should have published this update out of its normal monthly update cycle.Last week, right on Patch Tuesday, in fact, Microsoft learned of a zero-day vulnerability, and toward the end of the week, it was being widely exploited.

The first point is that more zero-days are being released on, or right after, Patch Tuesday. This is no doubt a tactic designed to maximize the shelf life of the exploit. I fully expect this trend to increase, especially as more software vendors publish software security updates on a standard schedule. I still think this practice reaps more benefit than harm: without it, there would be more zero-day attacks and we'd be patching our systems every week. That drains enterprise resources.

Second: Microsoft had to release this patch because the vulnerability was being exploited, and users could get attacked just by visiting a Web site -- even so-called trusted Web sites. It was getting nasty.

As was explained to Thomas Claburn in this story:

"The browser flaw had been disclosed roughly one week ago as a zero-day vulnerability, and active exploits have been around the Internet for that time frame as well," Qualys CTO Wolfgang Kandek said in an e-mailed statement. "The workarounds provided by Microsoft were very technical and quite cumbersome to implement, making it imperative for Microsoft to release a fix as quickly as possible."

That sums it up well. The workarounds were quite kludgey.

However, I have to take partial issue with this take from Roel Schouwenberg, senior antivirus researcher with Kaspersky Lab, Americas, on what this flaw's lack of wormability, and subsequent out-of-band patch, means:

"[That] shows that the wormability of a vulnerability is no longer a good indicator of the seriousness of a threat and that these Web-based threats are now much more dangerous than network worms," said Roel Schouwenberg, senior antivirus researcher for Kaspersky Lab, Americas, in an e-mailed statement.

I see his point, and actually agree that Web-based threats are both more prevalent and more dangerous (in many scenarios I can think of) than network worms. However, "worm ability" is still a strong indicator of the seriousness of a threat.

And we will see more Web-based worms in the future. Why? Because they're more profitable than network worms. The age of network worms died largely because there's more profit to develop exploits that can make a buck: not worms that essentially cause widespread denial-of-service situations.

Wormable or not. Whether Microsoft should have gone out-of-band with this one, or not. You need to patch MS08-078.

Eric Schultze, CTO at Shavlik Technologies, e-mailed me an interesting wager: "I'd bet you a cookie that many companies can't get it rolled out as quickly as Microsoft got it built."

I'll bet he's right.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-21
Multiple cross-site scripting (XSS) vulnerabilities in Chyrp before 2.1.2 and before 2.5 Beta 2 allow remote attackers to inject arbitrary web script or HTML via the (1) content parameter to includes/ajax.php or (2) body parameter to includes/error.php.
PUBLISHED: 2019-11-21
The web administrative portal in Zhone zNID 2426A before S3.0.501 allows remote authenticated users to bypass intended access restrictions via a modified server response, related to an insecure direct object reference.
PUBLISHED: 2019-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Synametrics Technologies SynaMan before 3.5 Build 1451, Syncrify before 3.7 Build 856, and SynTail before 1.5 Build 567
PUBLISHED: 2019-11-21
rConfig 3.9.2 allows devices.php?searchColumn= SQL injection.
PUBLISHED: 2019-11-21
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read.