Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • Networking

    Why Did Microsoft Delay IE Patch?

    Written by

    Ryan Naraine
    Published August 23, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Microsoft has temporarily delayed the re-release of a critical Internet Explorer browser patch because of problems with the way its proprietary Systems Management Server handles cabinet (.cab) files, according to sources familiar with the matter.

      The Redmond, Wash., software giant markets SMS as a business tool for simplifying patch management, but because of a bug in the way the SMS architecture handles certain compressed files, the company temporarily cancelled the patch release originally scheduled for Aug. 22.

      Microsoft delays software updates typically because of quality assurance concerns, but this is the first time the company has made it known that a kink in its distribution mechanism is the cause for the temporary cancellation of an important patch.

      The decision is not sitting well with Internet security experts.

      /zimages/4/28571.gifRead more here about the vulnerability introduced by Microsofts IE browser patch.

      eEye Digital Security, the private research outfit that blew the lid on the exploitable nature of the vulnerability after Microsoft described it as a simple browser crash, says a flaw in SMS is no reason to leave customers at risk of code execution attacks.

      “[Microsoft is] delaying a security patch, not because there is a problem with their patch, but a problem with their proprietary distribution engine,” said eEye Chief Executive Ross Brown, in Aliso Viejo, Calif. “Auto Update works and a million other patching vendors should be able to handle it, but because SMS is flawed, they are leaving customers unsecured?”

      In an entry posted to his personal blog, Brown bristled at Microsofts contention that eEye acted irresponsibly when it announced its discovery that the browser crash could be used to plant malicious code on fully patched Windows systems.

      He offered a chronology of the events that led to the Aug. 22 decision to delay the patch, arguing that Microsofts own security advisory “tells the bad guys exactly where the vulnerability is.”

      “So, to recap, Microsoft writes a patch that causes another flaw, then delays releasing the patch (unless you call Microsoft support) and then releases the information needed to identify the vulnerability in their own advisory update,” Brown said.

      On the official MSRC (Microsoft Security Response Center) blog, program manager Stephen Toulouse described the decision to delay the IE patch as “difficult but necessary.”

      “Providing the update in its current state would have resulted in customers being unable to deploy the update,” Toulouse said. He did not elaborate on this or confirm that the SMS issue was the cause for the delay.

      /zimages/4/28571.gifClick here to read about Microsofts previous problems with the quality of its patches.

      Toulouse said Microsoft made a decision to withhold the full security implications of the browser crash because that would have been a violation of its position on responsible disclosure and would have put customers at increased risk.

      “This was another difficult decision on our part. There was no intent here to misrepresent the issue as not being exploitable. Oftentimes, however, we find ourselves in the position of having to strike a balance between providing information equally to users who would use the information to protect themselves, and attackers who, history has proven, will immediately use the information for criminal purposes,” Toulouse said.

      However, eEye Chief Hacking Officer Marc Maiffret said Microsofts stance is hard to understand. “This information is already known in research circles and also [to] exploit writers,” Maiffret said in an interview with eWEEK.

      Indeed, according to security alerts aggregator Secunia, based in Copenhagen, Denmark, at least two research outfits—eEye and Bold Internet Solutions—reported the exploitable condition to Microsoft.

      “If we are finding this, we have to assume the bad guys are looking and finding it too,” Maiffret said.

      Microsofts Toulouse confirmed that the company was working with multiple researchers and said there was a disagreement on when to go public with the information that the bug was much more serious than a browser crash.

      On the official IE blog, Microsoft Group Program Manager Tony Chor was scathing in his criticism of eEye, accusing the company of “irresponsibly” disclosing the severity of the flaw.

      Neither Chor nor Toulouse could be reached to react to eEyes claim that Microsofts own advisory mentioned “long URLs” as the cause of the crash, in effect pointing potential attackers in a certain direction. In Chors blog entry, he also mentioned that the vulnerability exists through a crash in “urlmon.dll,” which is much more information than eEye and others released.

      Chor said Microsoft will hold the developer responsible for the new vulnerability introduced by the original IE patch. “Unfortunately, we missed this issue, plain and simple. In parallel with making the right fix, we have been working through how we prevent similar mistakes from happening again. For instance, we have code-reviewed the past ten months of code check-ins from the developer responsible for this issue,” Chor said.

      He said the company was also “reconsidering” staffing and tools to allow it to scale better during heavy load periods.

      /zimages/4/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Ryan Naraine
      Ryan Naraine

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.