When Independent Security Experts Patch Windows Faster Than Microsoft
from the doesn't-look-good dept
There’s been a lot of talk the last few days about the latest exploit found on Microsoft Windows platforms that could be used to install various malware just by making someone view an image. However, the really interesting thing is that while Microsoft is scrambling to make a patch, an independent security researcher has come out with his own patch that security firms are recommending people use until Microsoft gets its act together. In the past, of course, people were warned not to trust third-party patches, but as exploits taking advantage of vulnerabilities show up faster and faster, the race will soon be on for others to create security patches as well, which could create problems if not all of those patches are safe. Update: Meanwhile Microsoft is telling folks to just hang in there, and they’ll get a patch out in a week or so.
Comments on “When Independent Security Experts Patch Windows Faster Than Microsoft”
now all they need is...
… FEMA’s Michael Brown to go on the news shows and tell people there is very limited damage, everything is under control.
Re: now all they need is...
Gates: You’re doing a great job, MS! There’s massive resouces en-route as we speak, and people shall be rejoicing soon.
Re: Re: now all they need is...
I’m sure Microsoft is pleased as punch to have other people racing to beat them to patch their buggy OS. This sets a precedent that’s very favorable for MS. “People pay for our buggy OS and patch it themselves!”
Must be nice...
Must be nice to not have to answer to the customers, or in reality the media more, if the patch destroys certain configurations. That’s pretty much the view of the writers of that “patch”. If the patch screws up hundreds of thousands of computers everyone will say, “Oh well, at least they tried. It was more than Microsoft did.” (Wow…I actually managed to write Microsoft without putting dollar signs in it or spelling it wrong…imagine that)
the recent WMF exploit
If you are referring to the “WMF” exploit, you should be aware that all browsers are vulnerable.
To quote Brian Livingston’s excellent – and free Windows Secrets newsletter, “Every browser is vulnerable ? IE, Firefox, Opera, and others ? because the image is not being rendered by the browser. It’s rendered by Windows’ own Picture and Fax Viewer (Shimgvw.dll, also known as the Shell Image View Control). New versions of Firefox do display an alert when a suspicious image is encountered on a Web page. But since viewing an image is usually harmless, most users will click OK, exposing themselves to infection.”
I installed the unofficial patch on my network. It was quick, easy, and includes an uninstall. It does require a reboot.
Check out Windows Secrets at: http://www.windowssecrets.com/