Microsoft yanks troublesome Exchange security patch
For the second month in a row, Microsoft has released, then withdrew, buggy software patches
IDG News Service - Citing installation issues and inadequate testing, Microsoft has withdrawn an Exchange Server 2013 security update that it issued earlier this week as part of its "Patch Tuesday" release cycle.
This is the second month in a row that Microsoft has withdrawn a patch because it could cause problems for the system it was designed to repair. In July, the company recalled four buggy patches.
When installed, the MS13-061 security update for Exchange can impede access to the content indexes for mailbox databases and may also rename the Exchange Search Host Controller service.
Microsoft advised against installing the patch. For those who have already installed it, the company offered instructions to fix the problem, which involves editing registry keys.
Microsoft had failed to test the patch correctly, it admitted.
"Unfortunately, this security update did not get deployed into our dogfood environment prior to release," Microsoft said in an alert.
The bug doesn't affect Exchange 2007 or Exchange 2010 because they have a different architecture.
Microsoft also withdrew a patch last December.
Despite the series of missteps, "I don't see this as indicative of a larger quality control problem at Microsoft, but rather of a consequence of the high degree of variations that one encounters in the enterprise software market," Wolfgang Kandek, CTO of security and compliance software provider Qualys, said via email.
He said it's virtually impossible for enterprise software vendors to quickly test an update across all the possible hardware and software combinations.
To mitigate potential damage from faulty patches, Kandek suggested customers test the update in a controlled environment before rolling it out across the entire organization.
He also advised organizations to stick to popular hardware and software configurations as much as possible, to increase the chances that a patch will have been tested against their own setup.
Migrating to the cloud is also an option, Kandek said.
"In Microsoft's case it is much easier to make sure Office 365 works perfectly or even hosted SharePoint, than assuring that their software will operate as designed in all different customer environments," he wrote.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts