Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Windows patch backfires on the security-minded
CNet ^ | 17 October 2005 | Joris Evers

Posted on 10/18/2005 7:30:01 AM PDT by ShadowAce

Security-conscious Windows users who tweaked the operating system to protect their PCs better are getting hit hardest by a flawed Microsoft patch, experts said Monday.

Microsoft has acknowledged that a patch released last week can cause trouble for some users. It could lock them out of their PC, prevent the Windows Firewall from starting, block certain applicationsfrom running or installing, and empty the network connections folder,among other things, the software maker said in an advisory on Friday.

The trouble occurs when default permission settings on a Windows folder have been changed, according to Microsoft. Those changes aren't common, but have been applied by some people to add extra security to their systems, experts said.

"The flaw in the patch affects users who tightened down access lists," said Johannes Ullrich, the chief research officer at the SANS Institute. "These are typically more-advanced, security-conscious users."

The settings are also likely to be used by businesses with strict access requirements, such as those in the financial services or health care industries, said Vijay Adusumilli, a senior product manager at security software vendor St. Bernard Software. "They tighten settings for security purposes," he said.

The patch was released on Tuesday to fix four Windows vulnerabilities. Microsoft tagged the combined vulnerabilities "critical," and experts warned that a worm attack linked to the issue could be imminent. The software maker urged all users to immediately apply the update, delivered in security bulletin MS05-051.

"If users made changes to their security settings and tightened them, this patch is going to break a whole lot of software," Adusumilli said. The update simply didn't take into account all the possible Windows user configurations, he said.

The problem may result in more apprehension among users when it comes to applying Windows patches, he noted. "Microsoft's patch quality reputation just started to improve, but I think this is going to dent that a bit," Adusumilli said.

That is worrying, especially with a narrowing amount of time between the release of a software fix and a malicious code attack that exploits the vulnerability related to it, Ullrich said. The narrowing "patch window" has moved people to apply remedies faster.

"Many companies have come to rely on high patch quality to use accelerated deployment procedures for critical patches. But the problems with MS05-051 will make people think twice next time around," Ullrich said.

The flawed update delivered "two strikes against good security," Ullrich said. "First, you get penalized for running an enhanced security template. Next, you get penalized for patching quickly."

Microsoft had no immediate comment for this story.


TOPICS: Technical
KEYWORDS: microsoft; patch
Navigation: use the links below to view more comments.
first 1-2021-29 next last

1 posted on 10/18/2005 7:30:06 AM PDT by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...

2 posted on 10/18/2005 7:30:28 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

BTW--thanks to N3WBI3 for the link.


3 posted on 10/18/2005 7:35:52 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce

4 posted on 10/18/2005 7:36:32 AM PDT by frogjerk (LIBERALISM - Being miserable for no good reason)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce

5 posted on 10/18/2005 7:42:33 AM PDT by martin_fierro (< |:)~)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
This happened on many of our systems. Explorer wouldn't run, using Task manager to try to run a new task was SSSLLLOOOOWWWWWWW... We found the problem to be in the Bypass Traverse Checking in the Group Policy. It was set to Administrators only. The default is Administrators, Backup Operators, Power Users, Users, Everyone per Microsoft. Here's how we fixed our problem with Win2K, but to fix XP is very similar:

Go to Start>Run.
Type in MMC and select OK.
A window titled Console1 will appear with a daughter window titled Console Root inside.
In the Console 1 window click File and select Add / Remove Snap-in
The Add / Remove Snap-in window will appear.
Click Add at the bottom left of the window
The Add Standalone Snap-in window will appear.
Scroll down and highlight Group Policy and click Add at the bottom of the screen.
The Select Group Policy Object window will appear.
Make no changes, just select Finish
Close the Add Standalone Snap-in window
Select OK at the Add/Remove Stand-in window.
Users may notice that instead of Group Policy, Local Computer Policy appears now. This is normal.
The Console Root window now contains the Local Computer Policy with a + next to it.
Follow the path below.

Console Root>
Local Computer Policy>
Computer Configuration>
Windows Settings>
Security Settings>
Local Policies>
User Rights Assignment

Once User Rights Assignment is highlighted then on the right hand side of the window double-click Bypass traverse checking.
The Local Security Policy Setting windows will open. Click Add at the bottom of the window.
The Select Users or Groups window appears.
Highlight the Everyone group at the top pain of the window.
Click the Add button in the middle of the screen.
The Everyone account moves to the bottom pain of the screen.
Click Ok at the bottom of the window
You will now return to the Local Security Policy Setting window.
The Everyone group is now listed in the window.
There should be a check in the box next to Everyone under the Local Policy Setting header.
If not, check it and click Ok.
Exit the Console1 window.
If asked to save the settings of Console1 answer no.

Hope this helps
Æ
6 posted on 10/18/2005 7:47:04 AM PDT by AgentEcho (If there are no dogs in Heaven, then when I die I want to go where they went. - Will Rogers)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce

So it seems the problem is with the download being filtered, and not with the patch itself?


7 posted on 10/18/2005 7:47:12 AM PDT by RedBloodedAmerican
[ Post Reply | Private Reply | To 1 | View Replies]

To: AgentEcho

What made the change? Mine is fine.


8 posted on 10/18/2005 7:52:08 AM PDT by RedBloodedAmerican
[ Post Reply | Private Reply | To 6 | View Replies]

To: ShadowAce

MAC is the answer. Mine never, but never has had a problem and I have had four MACs (upgrades) in 12 years. All PC owners must have a permanent link to Kim Kommando just to keep their PS up and running and even then Gates and company can and do screw it all up. Flame away!


9 posted on 10/18/2005 7:52:31 AM PDT by Paulus Invictus
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
Microsoft has acknowledged that a patch released last week can cause trouble for some users. It could lock them out of their PC, prevent the Windows Firewall from starting, block certain applicationsfrom running or installing, and empty the network connections folder,among other things, the software maker said in an advisory on Friday.


If you want a Google GMail account, FReepmail me.
Also, please see The Backside of American History
You'll love this 187 page .pdf (1.99 MB)

10 posted on 10/18/2005 7:55:43 AM PDT by rdb3 (Have you ever stopped to think, but forgot to start again?)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce
Unfortunatly, this demonstrates one of the most overlooked requirements of any computer security, and it DOES NOT MATTER WHAT SYSTEMS YOU'RE DEALING WITH!

You NEVER, NEVER, apply any patch to a production system, without first having tested it on your identical system in the test lab!

What? You don't have a test lab? Well, set one up! And be sure that you've got identical hardware in there, since patches can interact differently with different drivers.

It's an ugly situation, and it's only going to get worse.

Mark

11 posted on 10/18/2005 7:57:14 AM PDT by MarkL (I didn't get to where I am today by worrying about what I'd feel like tomorrow!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

The firewall thing has effected me. Lot of other odd things happening too. To complicate matters, the system log is starting to show disk errors. Hard disk problems? MS patch problems? Both? Damn.


12 posted on 10/18/2005 7:58:54 AM PDT by DManA
[ Post Reply | Private Reply | To 1 | View Replies]

To: martin_fierro


'Microsoft had no immediate comment for this story'

You'll probably see fewer hackey-sacks on the M-Soft Campus for a few weeks ;>





13 posted on 10/18/2005 7:59:41 AM PDT by Capn TrVth
[ Post Reply | Private Reply | To 5 | View Replies]

To: AgentEcho
That is EXACTLY what's happening with my system. Thanks so much, I'll try this.

This happened on many of our systems. Explorer wouldn't run, using Task manager to try to run a new task was SSSLLLOOOOWWWWWWW...

14 posted on 10/18/2005 8:01:02 AM PDT by DManA
[ Post Reply | Private Reply | To 6 | View Replies]

To: Paulus Invictus
MAC is the answer.

Nobody's perfect. Apple has had some problems with their updates/upgrades. Remember the erasing hard drives?

Of course, this problem wouldn't have occurred if you didn't need to do massive tweaking to properly secure a Windows box.

15 posted on 10/18/2005 8:02:22 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 9 | View Replies]

To: AgentEcho

Great! Thanks for posting the solution. Since I don't personally run WIndows, I had no idea what the fix was.


16 posted on 10/18/2005 8:02:22 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 6 | View Replies]

To: MarkL
You NEVER, NEVER, apply any patch to a production system, without first having tested it on your identical system in the test lab!

We used to do this even for the thousands of clients under our umbrella. We had a pretty strict, locked-down baseline, and we tested all patches before approving them for release. The lab was pretty big, with a reasonable sampling of the hardware and software that was out there.

A few times the testing caught Microsoft opening up ports that we had closed and enabling services that we had disabled for security reasons. That was scary.

17 posted on 10/18/2005 8:06:22 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 11 | View Replies]

To: MarkL

Yeah, sure. Every small business has the time and money to set up a test lab for their computer systems. Why, our 20 person shop has an empty office just waiting for a full time IT guy to manage our Windows updates for us.


18 posted on 10/18/2005 8:14:55 AM PDT by LexBaird (tyrannosaurus Lex, unapologetic carnivore)
[ Post Reply | Private Reply | To 11 | View Replies]

To: MarkL
amen. take the least important machine you can and patch, and test it like crazy. then a medium important machine with a full and easy to access backup, and test like crazy. when you are SURE that no mission critical stuff will break, then you patch your important equipment.

some stuff is *SO* mission critical that it is vorbotten to patch or touch the working system! if it needs protection, the protection comes from outboard appliances like active intrusion detectors or firewalls...

19 posted on 10/18/2005 8:30:36 AM PDT by chilepepper (The map is not the territory -- Alfred Korzybski)
[ Post Reply | Private Reply | To 11 | View Replies]

To: RedBloodedAmerican; DManA
RBA - You probably have administrative rights so the problem doesn't appear. Or you're lucky. Not all of out 2000 systems had the problem.

DManA - I forgot the first step. Log in with an administrator account.
20 posted on 10/18/2005 8:37:21 AM PDT by AgentEcho (If there are no dogs in Heaven, then when I die I want to go where they went. - Will Rogers)
[ Post Reply | Private Reply | To 8 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-29 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson