15 May 2006 | 3,407 views

Microsoft Patching Practises Come Under Fire

Secure Your Website with Acunetix

Aye…it’s not the first time.

The question came up, is Microsoft silently fixing security vulnerabilities and deliberately obfuscating details about patches in its monthly security bulletins?

Matthew Murphy, a security researcher who has worked closely with the MSRC (Microsoft Security Response Center) in the past, is accusing the software maker of ‘misleading’ customers by not clearly spelling out exactly what is being patched in the MS06-015 bulletin released on April 11.

That bulletin, rated “critical,” contained patches for a remote code execution hole in Windows Explorer, the embedded file manager that lets Windows users view and manage drives, folders and files.

However, as Murphy found out when scouring through the fine print in the bulletin, the update also addressed what Microsoft described as a “publicly disclosed variation” of a flaw that was reported in May 2004 (CVE-2004-2289.)

In an entry posted to the SecuriTeam blog, Murphy noted that the vulnerability that is documented was privately reported, but the “variation” that was also patched has been publicly known for 700+ days.

What’s the thoughts about this one?

He posted in depth about this in the Full Disclosure list. Interesting reading.

Source: eWeek





                

Recent in Exploits/Vulnerabilities:
- Royal Canadian Mounted Police Arrest Heartbleed Hacker
- Heartbleed Bug SSL Vulnerability – Everything You Need To Know
- Oracle Java Cloud Service Vulnerabilities Publicly Disclosed

Related Posts:
- Microsoft Patches At Least 34 Bugs Including Pwn2Own Vulnerability
- Whos is tonyenkiducx? Who the hell are you?
- Microsoft Warns of Serious MS-SQL 2000 & 2005 Vulnerability

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 225,427 views
- AJAX: Is your application secure enough? - 118,959 views
- eEye Launches 0-Day Exploit Tracker - 84,997 views

Low-cost VPS Hosting

Comments are closed.