RE: Another Low Blow From Microsoft: MBSA Failure!

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2004-02-10 at 13:26, Joe DeMarco wrote:
> Maybe it's just me but, I wouldn't consider a patch successfully
> applied
> until the machine is rebooted. Registry changes usually require this
> process.

I would go even further and question the reliability of just checking
for the presence of Registry keys that claim a patch has been installed.
Anything short of verifying the MD5 hash of a given DLL, driver file or
executable just makes assumptions about a patched version being present
or not. Those assumptions tend you come back to haunt you, and I believe
there are enough people that had exactly that happening. I remember some
patch (a year or so ago) that overwrote a previously patched DLL with a
vulnerable version. Anything checking Registry keys, like Windows Update
I believe, made the assumption that the system was patched when in fact
the defective DLL rendered the system vulnerable.

Any tool, Windows Update, MBSA, or 3rd party should check the actual
files in question, not just logfiles or Registry keys (or anything that
makes historical statements rather than actual statements).

Regards,
Frank



Attachment: signature.asc
Description: This is a digitally signed message part


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux