Microsoft pushes Windows Web bug patch to everyone
Offers ASP.Net fixes to all customers through Windows Update
Computerworld - Microsoft today released its latest emergency patch to its Windows Update distribution service, making good on a promise earlier this week.
On Tuesday, Microsoft shipped a fix for a flaw in the ASP.Net Web site and application framework that let attackers steal important data from Web servers, including account usernames and passwords.
At the time, the fix was only available from Microsoft's download site, which forced server administrators to manually retrieve and install the update. That caused some confusion among IT professionals and prompted them to bombard the company with questions.
Starting today, the MS10-070 update can be downloaded and installed through the usual Windows Update service, and the business-oriented Windows Server Update Services (WSUS) tool.
Microsoft acknowledged that its decision to offer the update manually before it had wrapped up Windows Update distribution testing was unprecedented, but argued that it was the best way to get the fix into administrators' hands as quickly as possible.
The Microsoft Security Response Center (MSRC) reported that attacks exploiting the ASP.Net encryption bug had been seen in the wild, one of the reasons why it pushed the patch to Microsoft's download center on Tuesday.
Other security experts applauded Microsoft for releasing the patch before it was ready to ship via Windows Update, noting that end users, who rely on Windows automatic update mechanism to keep their PCs current, weren't at risk from attack.
Some of the administrators trying to patch their Web servers might have disagreed.
After Scott Guthrie, the Microsoft executive who runs the ASP.Net development team, listed the array of updates -- up to six separate downloads for some server configurations -- scores of customers asked which updates they needed to download or reported patch errors.
Many of the questions were answered within hours by Jamshed Damkewala, identified as a lead program manager with the .Net framework engineering team.
Andrew Storms, manager of security operations at nCircle Security, argued that Microsoft's unique delivery technique earlier this week put pressure on administrators to keep to their usual patching practices.
"This is more than a 'download and install' kind of patch," Storms acknowledged in an instant message exchange. "But in similar fashion to, say, an Exchange or SQL server patch, the operational installation method here is still in the hands of the installer. This is why, despite Microsoft's fantastic patch quality, the enterprise still needs to follow prudent patch testing procedures."
Microsoft first sounded the alert about the ASP.Net bug on Sept. 17, after a pair of researchers demonstrated how attackers could pilfer browser session cookies, or steal passwords and usernames from Web sites. Three days later, Microsoft warned users that it was seeing limited, active attacks, and urged Web server administrators to apply complex workarounds it listed in an updated advisory.
The patch released today via Windows Update makes those workarounds unnecessary, Microsoft has said.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Security in Computerworld's Security Topic Center.
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!