Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Patch-Fatigued Users Contemplate Ditching Microsoft
InternetWeek ^ | September 15, 2003 | John Foley, George V. Hulme

Posted on 09/15/2003 1:30:06 PM PDT by HAL9000

With the Blaster worm seeming to be under control, alleged virus-author Jeffrey Parson under house arrest in Minnesota, and hacker Adrian Lamo under the watchful eye of the feds, business-technology managers may have enjoyed a few hours of peace and quiet last week. But it was short-lived. On Sept. 10, Microsoft issued a security bulletin warning of three new critical vulnerabilities in the Windows operating system, sending systems administrators rushing to patch their computers. It's become an all-too-common scenario--and one that's causing some businesses to re-evaluate their heavy reliance on Microsoft products.

A year-and-a-half after Bill Gates declared that trustworthy computing had become Microsoft's No. 1 priority, the software bugs keep coming. The latest vulnerabilities involve the Remote Procedure Call service in Windows, making it possible for a malicious hacker to take control of a target system, introduce an infectious worm, or launch a denial-of-service attack. A week earlier, Microsoft issued five other warnings, four involving the omnipresent Office applications suite. For the year, the tally stands at 39.

And those are just the holes that have been uncovered by others and reported to Microsoft. In addition, the software vendor is combing through its code, finding holes, and issuing patches without publicizing the flaws. No one knows how many more are yet to be uncovered. "There's no way to wrap your hands around that," says Dan Ingevaldson, engineering manager with security vendor Internet Security Systems Inc.

Some business and technology professionals are running out of patience. "The issues around these vulnerabilities are escalating to the point where it's not just CIOs or CTOs, it's corporate officers, it's boards of directors asking: 'What are we going to do?'" says Ruth Harenchar, CIO of Bowne & Co., which last week scrambled to patch 4,500 Windows PCs and 500 servers in the United States and more overseas. "The situation appears to be getting worse, not better."

The patching work has thrown Bowne & Co.'s technology projects off schedule. Now, the specialty-printing-services company is assessing its options. Among them: redesigning its network around a thin-client model to reduce the number of PCs running Windows and, on other machines, migrating to Linux. "It's getting to be enough of a burden that you have to seriously start thinking about alternatives," Harenchar says.

Raymond James & Associates has assembled a team of IT staffers to manage the constant patching. "Organizations have to mobilize and realize this is going to be a way of life for the foreseeable future," says VP of IS Gene Fredriksen.

The financial-services firm, with offices around the world, last week began the arduous task of patching 10,000 PCs and 1,000 servers. "The pressure is on," Fredriksen says. "Anybody that isn't patched by the weekend is going to have trouble." The fear is that the latest vulnerability leaves Windows computers open to a Blaster-like worm. "There's a very good chance that a worm is going to be developed" to take advantage of the latest security holes, says ISS's Ingevaldson.

"People are getting fed up," says Lloyd Hession, chief information security officer at financial-network provider Radianz, adding that the number of Windows patches is reaching "epic proportions." The situation is causing more than just a few disgruntled customers to re-evaluate how much they use Microsoft products. Says Gartner security analyst John Pescatore, "There's definitely a very large trend towards that."

The problem of buggy code isn't limited to Microsoft software. And, at a congressional subcommittee hearing on the vulnerability of the country's computing infrastructure to worms and viruses--a hearing that was held, coincidentally, on the same day last week that Microsoft issued its security bulletin--Symantec Corp. president John Schwarz testified that software vulnerabilities "are being exploited faster and more aggressively than ever."

But Microsoft is at the center of the storm because its software is so widely used and a favorite target of the malcontents who write viruses and hack systems. At the same hearing, Microsoft senior security strategist Philip Reitinger described Microsoft's security-response program as "state of the art." He admitted, though, that "much remains to be done."

Just what is Microsoft doing to fix things? Last year, the company interrupted product development to train its Windows programmers in techniques for writing more-secure code. It has made some products harder to hack by turning off settings that raise risks, and it's screening old code for problems. And the automatic-update technology introduced in Windows XP is now available in Windows Server 2003 and Windows 2000.

Other steps are in the works. They include a hardware approach to creating secure systems called the Next-Generation Secure Computing Base, extending automatic updates to more Microsoft products, new "protective" software that guards systems even when patches aren't applied, and antivirus products and services.

Jeff Jones, senior director of trustworthy computing security, says Microsoft is making progress and points to the fact that Windows Server 2003 had half as many patches as Windows 2000 after 90 days of availability. "That's a clear improvement," Jones says.

Some customers are satisfied Microsoft is doing everything it can. "Their intentions are good," says Robert Egan, VP of IT at Boise Cascade Corp., which recently created a task force to respond to Microsoft's security bulletins. Egan says the work involved is "tolerable" but adds that the real issue is that "we'd rather be spending time enhancing our systems" than fixing them.

That's the rub. Another business-technology executive estimates his company's IT department has wasted more than 1,000 hours patching Windows systems. He's looking at thin clients and Linux as alternatives to Windows and, late last week, he was drafting a letter to Microsoft. The message: He'd like Microsoft to reimburse his company for all those hours of lost productivity.

Yet, business better get used to it. CIOs need to "literally put a line item" in IT budgets to cover the ongoing cost of patches, advises Kerry Gerontianos, president of systems integrator Incremax Technologies Corp. On the old goal of administration-free Windows, Gerontianos says, "that was a dream."



TOPICS: News/Current Events; Technical
KEYWORDS: blaster; lowqualitycrap; microsoft; spaghetticode; usesgoto; virus; whinersgalore; windows; worm
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 161-173 next last
To: DonQ
If Microsoft is replaced in popularity by Apple, Linux, Sun Systems or something else, soon enough there will be hackers and virus-authors eager to tackle that technology.

I see. But how would the attacker become "root" to really do damage on a *nix system?


21 posted on 09/15/2003 2:18:42 PM PDT by rdb3 (Which is more powerful: The story or the warrior?)
[ Post Reply | Private Reply | To 6 | View Replies]

To: ex-Texan
I am running Windows 98 and use MSIE 5.5 as my default browser. I downloaded MSIE 6 and was so disgusted I ditched it within a few hours.

Is that possible to do, go back from 6 to 5.5?

I'm an Opera user and the only reason I have IE on my laptop is to go to WindowsUpdate.
22 posted on 09/15/2003 2:19:36 PM PDT by lelio
[ Post Reply | Private Reply | To 8 | View Replies]

To: HAL9000
his company's IT department has wasted more than 1,000 hours patching Windows systems

That's more of a problem about how his systems are setup. If I didn't have red-carpet installed on some of my systems I might be sending hours on each one updating them.

If he trusts windowsupdate he could just install VNC on each server, go to each one and start IE. Download the patch and reboot.

Its not like people that use Windows as a server aren't expecting a reboot a week anyway so you don't even have to schedule it!
23 posted on 09/15/2003 2:22:39 PM PDT by lelio
[ Post Reply | Private Reply | To 1 | View Replies]

Anything made by man can be destroyed/defeated by man.
24 posted on 09/15/2003 2:22:53 PM PDT by Leatherneck_MT (If you continue to do what you've always done, you will continue to get what you've a‚i]±s got.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Wneighbor
Hay, pirate lover. Ping to #14
25 posted on 09/15/2003 2:33:30 PM PDT by Prof Engineer (I married Msdrby on 9/11/03. --- Blast it Jim, I'm an Engineer, not a walking dictionary.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: IncPen; HAL9000; Liberal Classic; TechJunkYard
Don't have to worry about that. I was the only one actively pinging Bush2000, Golden Eagle and TheEngineer and I ditched them upon turning to Linux a week ago. They just seem to find these threads all by themselves again now ;-(.

And HAL9000 is also right about microsoft being low quality cr*p. I was constantly repeat message spamming on this forum until my Linux switch due in all probability to a bug in IE. I really get the feeling that Microsoft coders are carrying the practice of using GOTO from their BASIC experience into C/C++ coding producing spaghetti code. Probably another reason they don't wnat to open source anything.

26 posted on 09/15/2003 2:59:47 PM PDT by Coral Snake (Biting commies, crooks, globalist traitors, islamofascists and any other type of Anti American)
[ Post Reply | Private Reply | To 5 | View Replies]

To: lelio
You must go through the uninstall procedure. What a nightmare. But I have installed new free software that included MSIE 5.5 in a bundle of items. Now I must beware of Microsoft's program which instigates a trip to their site every three months telling me I have to upgrade.

Believe you can go to a web site like www.twocows.com and still download MSIE 5.5. Do a Google on "download MSIE 5.5" and see what you find.

27 posted on 09/15/2003 3:31:02 PM PDT by ex-Texan (Read Sun Tsu: The Cold War Never Ended)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Coral Snake
B2k and the others are quite capable of finding these threads - they did so long before you came on the scene.
28 posted on 09/15/2003 3:38:49 PM PDT by Salo
[ Post Reply | Private Reply | To 26 | View Replies]

To: HAL9000; Prof Engineer
Oh good grief..... It is just not that big of a deal to stay up with patches.... Would rather have them real time than not have them.....

Cry me a river! No pity from me PE!
29 posted on 09/15/2003 3:39:39 PM PDT by HairOfTheDog (8 days to go!! And whither then? I cannot say)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Prof Engineer
Bill Gates is the anti-christ ping

I love Bill Gates.... Everything he has ever made has made my life better. I would write him more checks but I have everything already!

30 posted on 09/15/2003 3:45:55 PM PDT by HairOfTheDog (8 days to go!! And whither then? I cannot say)
[ Post Reply | Private Reply | To 12 | View Replies]

To: js1138
Bingo! Microsoft has made security a priority, which is exactly why the patches are coming out (on an average of four a month -- not exactly the overwhelming amount some people claim).

Of course, if Microsoft didn't keep the updates coming, the people would scream, "They're not doing enough!"

I actually had someone tell me that they've got better things to do than sit at his computer all morning and download things. Well so do I, which is why I patch my machine whenever things come out -- I don't let all of the patches accumulate.

It's not like Microsoft puts out 100 patches at a time.

31 posted on 09/15/2003 3:47:19 PM PDT by scott7278 ("If I'm not back by dawn -- call the president.")
[ Post Reply | Private Reply | To 7 | View Replies]

To: HAL9000
I can't believe my good fortune - I was hitting MS's web site this weekend and they asked me if I would take a survey. I got to have a nice little say on the quality of their web page (pretty good) and the quality of their software (not so good). I hope they call me for further explanation.
32 posted on 09/15/2003 3:48:29 PM PDT by Salo (Lying to a jury is perjury. Lying to the people is politics.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000
Courtesy Ping...
33 posted on 09/15/2003 3:51:02 PM PDT by TomServo ("Upon further review, the refs find that Cody is dead. The play stands -- Cody is dead.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: TomServo
LMFAO! Oh, yeahhhhhhh.... like these patch-fatigued users are nevvvvvvvvvvvvver going to have to patch Linux or a Mac or a Sun box... /SARCASM
34 posted on 09/15/2003 3:57:46 PM PDT by Bush2000
[ Post Reply | Private Reply | To 33 | View Replies]

To: Bush2000
LMFAO! Oh, yeahhhhhhh.... like these patch-fatigued users are nevvvvvvvvvvvvver going to have to patch Linux or a Mac or a Sun box...

I knew you'd get a chuckle out of this. ;-)

35 posted on 09/15/2003 4:00:09 PM PDT by TomServo ("Upon further review, the refs find that Cody is dead. The play stands -- Cody is dead.")
[ Post Reply | Private Reply | To 34 | View Replies]

To: tortoise
Not all operating systems are equally vulnerable to hacking and exploits no matter how common it is. Linux makes up a large percentage of the servers on the Internet, yet they do not get hacked in proportion to their ubiquitousness.

Do you just make this cr*p up as you go?!? Seriously, you're a one-man FUD generation machine. Nearly everything you type is false.

Linux is Favourite Hacker Target
36 posted on 09/15/2003 4:03:31 PM PDT by Bush2000
[ Post Reply | Private Reply | To 17 | View Replies]

To: Bush2000
Microsoft subsidizes their server business by leaving holes in the clients. I just got hit with some new blaster-like worm even after the next-to-latest patch. Why? Because that patch didn't close port 139. Why not? Because they need that open so their server products can access my client. The fact that I have no such server products and never will is meaningless to them because I am a nobody whose security is much less important than keeping vulnerable ports open for their big corporate customers to use.
37 posted on 09/15/2003 4:11:18 PM PDT by palmer (paid for by the "Lazamataz for Supreme Ruler" campaign.)
[ Post Reply | Private Reply | To 34 | View Replies]

To: ex-Texan
I hated it when I had to migrate recently from almost risk free Win95 to Win 98, but you couldn't pay me enough to go to the current versions of Windows.

I was forced to migrate because my new Virus software refused to load on a Win 95 system. Of course, Yahoo still refuses to let me listen to football games unless I buy a new computer AND install Microsoft's latest.

End of rant.
38 posted on 09/15/2003 4:40:47 PM PDT by PAR35
[ Post Reply | Private Reply | To 8 | View Replies]

To: Bush2000
And the first post under your link?

More grist for the mill. BTW, study paid for by MS - not that it discounts the information.

1 posted on 09/11/2003 3:21 PM CDT by Salo

39 posted on 09/15/2003 4:45:30 PM PDT by PAR35
[ Post Reply | Private Reply | To 36 | View Replies]

To: PAR35
I'm stopping with Win2K; it's stable enough for my purposes. I'm biding my time until Linux+Wine matures enough to use it instead. Until then, there's no way XP/2003/etc. is going anywhere near my PC.
40 posted on 09/15/2003 4:49:57 PM PDT by Windcatcher
[ Post Reply | Private Reply | To 38 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 161-173 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson