Important Windows Patch!

CForresterCForrester P0rk(h0p Join Date: 2002-10-05 Member: 1439Members, Constellation
<div class="IPBDescription">For NT, 2000, XP, and 2003</div> From <a href='http://www.grc.com' target='_blank'>GRC.com</a>:
<!--QuoteBegin--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> </td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->Microsoft has released a patch  which ALL USERS OF
WINDOWS NT, 2000, XP, and 2003 should apply immediately!

This vulnerability is being called "the mother of all Windows vulnerabilities" because it allows Windows-based commercial Internet servers and regular Windows users to be remotely compromised by malicious hackers.

Security experts were upset to learn that Microsoft was informed of this extremely serious vulnerability more than six months ago, yet took until now to cure the problem. The vulnerability was obvious and easy to fix once it was known, yet Windows NT, 2000, XP, and 2003 machines have remained susceptible. Now known publicly, the vulnerability is readily exploitable.

Users of Microsoft Outlook and Outlook Express are made vulnerable through their eMail client as well as other avenues, and Windows machines with default "network bindings", which are not protected by a personal firewall or NAT router, are directly vulnerable to remote Internet compromise.

Security experts expect one or more new Internet worms, and new eMail exploits to appear shortly, so please update all potentially vulnerable systems as soon as possible.  This is a big one folks . . .<!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->

Microsoft's security bulletin is <a href='http://www.microsoft.com/technet/security/bulletin/MS04-007.asp' target='_blank'>here</a>.

Make sure you apply the patch!
«1

Comments

  • MonsieurEvilMonsieurEvil Join Date: 2002-01-22 Member: 4Members, Retired Developer, NS1 Playtester, Contributor
    Bumped. CF spaketh the truth.
  • ZigZig ...I am Captain Planet&#33; Join Date: 2002-10-23 Member: 1576Members
    thank god for windows 98!!!


    ... =\
  • SkulkBaitSkulkBait Join Date: 2003-02-11 Member: 13423Members
    edited February 2004
    What? vulnerabilities in Outlook? in Windows itself!? Say it aint so! </jk>

    Seriously though, 6 months? WTH?

    In other news, a while ago MS (finally) patched the IE bug that allowed a mallicious link to send you to one domain, while displaying a different domain in the address bar.

    Patch: <a href='http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS04-004.asp' target='_blank'>Here</a>

    Interesting note:

    <!--QuoteBegin--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> </td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->eliminates the following three newly-discovered vulnerabilities:
    ...
    A vulnerability that involves the incorrect parsing of URLs that contain special characters. When combined with a misuse of the basic authentication feature that has "username:password@" at the beginning of a URL, this vulnerability could result in a misrepresentation of the URL in the address bar of an Internet Explorer window.<!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->

    <!--QuoteBegin--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> </td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->The following URL syntax is no longer supported in Internet Explorer or Windows Explorer after you install this software update:

    http(s)://username:password@server/resource.ext<!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->

    In other words, they didn't fix the bug, the removed the (very basic) feature that it exploited. Somehow I wasn't surprised.

    EDIT:
    Monse: the username:password@domain syntax is an agreed upon standard (RFC 1738), this is true, but MSs implimentation was (AFAIK) the only one affected by this exploit.
  • MonsieurEvilMonsieurEvil Join Date: 2002-01-22 Member: 4Members, Retired Developer, NS1 Playtester, Contributor
    edited February 2004
    Ahh, you mean the same feature that is in Netscape and Mozilla and Opera? It was a bug due to an agreed-upon web standard. They all had to fix it.

    What a shock, someone posts up a useful bit of patching information and someone has to come in and start an MS rant. Tell you what, I'm going to post every single patch that was released <i>just</i> for linux Suse 9.0, and just since December 2003 - that's in a whole 2 months:

    <!--QuoteBegin--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> </td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->02 Feb 2004
    RPM gaim 0.67-67 (i586) 1794 kB
    Patch-RPM gaim 0.67-67-patch (i586) 351 kB
    Source-RPM gaim-0.67-67.src.rpm  
    Security Update!
    Security Fix:
    The chat-client gaim is vulnerable to a buffer overflow
    in the parse url code. This bug leads to remote system
    compromise with the privileges of the user running gaim.

    --------------------------------------------------------------------------------

    29 Jan 2004
    RPM cups 1.1.19-85 (i586) 2022 kB
    Patch-RPM cups 1.1.19-85-patch (i586) 179 kB
    Source-RPM cups-1.1.19-85.src.rpm  
    The fix solves a memory leak in the cups protocoll. The problem
    appears mainly under Gnome, xd2.

    --------------------------------------------------------------------------------

    29 Jan 2004
    RPM cups-client 1.1.19-85 (i586) 139 kB
    Patch-RPM cups-client 1.1.19-85-patch (i586) 22 kB
    Source-RPM cups-1.1.19-85.src.rpm  
    The fix solves a memory leak in the cups protocoll. The problem
    appears mainly under Gnome, xd2.

    --------------------------------------------------------------------------------

    29 Jan 2004
    RPM cups-devel 1.1.19-85 (i586) 121 kB
    Patch-RPM cups-devel 1.1.19-85-patch (i586) 71 kB
    Source-RPM cups-1.1.19-85.src.rpm  
    The fix solves a memory leak in the cups protocoll. The problem
    appears mainly under Gnome, xd2.

    --------------------------------------------------------------------------------

    29 Jan 2004
    RPM cups-libs 1.1.19-85 (i586) 103 kB
    Patch-RPM cups-libs 1.1.19-85-patch (i586) 69 kB
    Source-RPM cups-1.1.19-85.src.rpm  
    The fix solves a memory leak in the cups protocoll. The problem
    appears mainly under Gnome, xd2.

    --------------------------------------------------------------------------------

    28 Jan 2004
    RPM whois 4.6.6-77 (i586) 32 kB
    Patch-RPM whois 4.6.6-77-patch (i586) 17 kB
    Source-RPM whois-4.6.6-77.src.rpm  
    Fixed 64-bit archs problem, which caused problem with some IPs?


    --------------------------------------------------------------------------------

    27 Jan 2004
    RPM nmap 3.30-70 (i586) 355 kB
    Patch-RPM nmap 3.30-70-patch (i586) 159 kB
    Source-RPM nmap-3.30-70.src.rpm  
    Security Update!
    Security Fix:
    nmap does not run as root due to bad interaction between kernel
    and user-space for pre calculated IP checksum. Thanks to Dirk Mueller
    for debugging.

    --------------------------------------------------------------------------------

    26 Jan 2004
    RPM netpbm 10.11.4-126 (i586) 1161 kB
    Patch-RPM netpbm 10.11.4-126-patch (i586) 252 kB
    Source-RPM netpbm-10.11.4-126.src.rpm  
    Security Update!
    Security-Fix:
    Some tools of the netpbm suite create files in an insecure manner
    that can lead to local privilege escalation.

    --------------------------------------------------------------------------------

    26 Jan 2004
    RPM tripwire 2.3.1-138 (i586) 3242 kB
    Patch-RPM tripwire 2.3.1-138-patch (i586) 3192 kB
    Source-RPM tripwire-2.3.1-138.src.rpm  
    This update fixes a segmentation fault caused by a change in the "binutils"
    package.


    --------------------------------------------------------------------------------

    22 Jan 2004
    RPM ltmodem 8.26a-172 (i586) 806 kB
    Patch-RPM ltmodem 8.26a-172-patch (i586) 803 kB
    Source-RPM ltmodem-8.26a-172.src.rpm  
    Enabled modversions to allow the driver to work after a kernel update.


    --------------------------------------------------------------------------------

    20 Jan 2004
    RPM quagga 0.96.2-74 (i586) 985 kB
    Patch-RPM quagga 0.96.2-74-patch (i586) 875 kB
    Source-RPM quagga-0.96.2-74.src.rpm  
    Security Update!
    Security Fix:
    Local users can send malicious netlink messages that cause
    denial-of-service conditions in the routing-daemon quagga.

    --------------------------------------------------------------------------------

    19 Jan 2004
    RPM tcpdump 3.7.2-82 (i586) 197 kB
    Patch-RPM tcpdump 3.7.2-82-patch (i586) 153 kB
    Source-RPM tcpdump-3.7.2-82.src.rpm  
    Security Update!
    The code for handling ISAKMP and RADIUS messages contained bugs
    which allowed remote attackers to crash tcpdump or to execute arbitrary code.

    --------------------------------------------------------------------------------

    15 Jan 2004
    RPM gnome-filesystem 0.1-117 (i586) 22 kB
    Patch-RPM gnome-filesystem 0.1-117-patch (i586) 21 kB
    Source-RPM gnome-filesystem-0.1-117.src.rpm  
    Security Update!
    Security Fix:
    This update fixes the insecure handling of temporary files.


    --------------------------------------------------------------------------------

    15 Jan 2004
    RPM gtk2 2.2.3-49 (i586) 2220 kB
    Patch-RPM gtk2 2.2.3-49-patch (i586) 847 kB
    Source-RPM gtk2-2.2.3-49.src.rpm  
    Fixes focus loop in gtk_socket_focus().
    Solves 100% CPU load problem in Notification Area Applet with
    GAIM, GnomeICU, ACME, Rhythmbox etc.
    For more see <a href='http://bugzilla.gnome.org/show_bug.cgi?id=122327' target='_blank'>http://bugzilla.gnome.org/show_bug.cgi?id=122327</a>

    --------------------------------------------------------------------------------

    13 Jan 2004
    RPM cvsup 16.1h-90 (i586) 1339 kB
    Patch-RPM cvsup 16.1h-90-patch (i586) 1286 kB
    Source-RPM cvsup-16.1h-90.src.rpm  
    Security Update!
    Security Fix:
    Removed public-writable directories from shared library search path.

    --------------------------------------------------------------------------------

    10 Jan 2004
    RPM mpg321 0.2.10-419 (i586) 43 kB
    Patch-RPM mpg321 0.2.10-419-patch (i586) 21 kB
    Source-RPM mpg321-0.2.10-419.src.rpm  
    Security Update!
    Security Fix:
    A format-bug in mpg321 can be exploited (even remotly by HTTP streaming)
    to execute code with the permissions of the user running mpg321 on
    special MP3 files.


    --------------------------------------------------------------------------------

    09 Jan 2004
    RPM XFree86 4.3.0.1-43 (i586) 9927 kB
    Patch-RPM XFree86 4.3.0.1-43-patch (i586) 398 kB
    Source-RPM XFree86-4.3.0.1-43.src.rpm  
    Security Update!
    Security Fix:
    Due to inproper checking of failure-conditions of pam_setcred()
    in XDM while using pam_krb5 a user with valid login credentials
    (Kerberos) may get root access to the system.

    --------------------------------------------------------------------------------

    09 Jan 2004
    RPM inn 2.4.0-47 (i586) 2411 kB
    Patch-RPM inn 2.4.0-47-patch (i586) 315 kB
    Source-RPM inn-2.4.0-47.src.rpm  
    Security Update!
    Security-Fix
    INN handles certain control messages in an insecure way. This may allow
    remote attackers to execute arbitrary commands. INN 2.3.x is not affected.

    --------------------------------------------------------------------------------

    09 Jan 2004
    RPM mc 4.6.0-210 (i586) 1403 kB
    Patch-RPM mc 4.6.0-210-patch (i586) 280 kB
    Source-RPM mc-4.6.0-210.src.rpm  
    Security Update!
    Fix for exploitable bug in mc's virtual file-system (VFS).
    This bug can be exploited by using a special archiv.
    The user which opens this archiv may execute arbitrary code
    and may therefore compromise the system security.


    --------------------------------------------------------------------------------

    07 Jan 2004
    RPM opera 7.50-1 (i586) 4795 kB
    Patch-RPM opera 7.50-1-patch (i586) 4631 kB
    Source-RPM opera-7.50-1.nosrc.rpm  
    Security Update!
    Opera didn't check the X509 certificate so anybody could eavesdrop
    the https communication.

    --------------------------------------------------------------------------------

    07 Jan 2004
    RPM python 2.3-52 (i586) 2998 kB
    Patch-RPM python 2.3-52-patch (i586) 1736 kB
    Source-RPM python-2.3-52.src.rpm  
    The python-devel package was missing the symlink libpython2.3.so, so
    that linking programs against python was not possible. This updates
    fixes this problem.

    --------------------------------------------------------------------------------

    06 Jan 2004
    RPM 3ddiag 0.703-176 (i586) 26 kB
    Patch-RPM 3ddiag 0.703-176-patch (i586) 17 kB
    Source-RPM 3ddiag-0.703-176.src.rpm  
    Security Update!
    Security Fix:
    Some scripts of 3Ddiag handle local temporary files in an insecure manner
    which may lead to local privilege escalation.

    --------------------------------------------------------------------------------

    05 Jan 2004
    RPM pin 0.29-47 (noarch) 8 kB
    Patch-RPM pin 0.29-47-patch (noarch) 6 kB
    Source-RPM pin-0.29-47.src.rpm  
    Security Update!
    Security Fix:
    Pin handles local temporary files in an insecure manner which may lead to local
    privilege escalation.

    --------------------------------------------------------------------------------

    27 Dec 2003
    RPM kopete 0.7.3-8 (i586) 3040 kB
    Patch-RPM kopete 0.7.3-8-patch (i586) 2089 kB
    Source-RPM kopete-0.7.3-8.src.rpm  
    Support again MSN chat, after last protocol change.


    --------------------------------------------------------------------------------

    19 Dec 2003
    RPM cvs 1.11.6-73 (i586) 506 kB
    Patch-RPM cvs 1.11.6-73-patch (i586) 231 kB
    Source-RPM cvs-1.11.6-73.src.rpm  
    Security Update!
    Security Fix:
    The cvs server side can be tricked in creating files in the root file-system.

    --------------------------------------------------------------------------------

    19 Dec 2003
    RPM k_smp 2.4.21-166 (i586) 25819 kB
    Source-RPM k_smp-2.4.21-166.src.rpm  
    Security Update!
    Paul Starzetz of iSEC reported a vulnerability in the mremap system call,
    which allows local attackers to crash the machine, and even to obtain super
    user privileges under some circumstances.

    This update fixes the vulnerability.


    --------------------------------------------------------------------------------

    19 Dec 2003
    RPM k_smp4G 2.4.21-166 (i586) 25783 kB
    Source-RPM k_smp4G-2.4.21-166.src.rpm  
    Security Update!
    Paul Starzetz of iSEC reported a vulnerability in the mremap system call,
    which allows local attackers to crash the machine, and even to obtain super
    user privileges under some circumstances.

    This update fixes the vulnerability.


    --------------------------------------------------------------------------------

    19 Dec 2003
    RPM memprof 0.5.1-115 (i586) 149 kB
    Patch-RPM memprof 0.5.1-115-patch (i586) 91 kB
    Source-RPM memprof-0.5.1-115.src.rpm  
    Bugfix:
    libmemintercept.so, required for running memprof, was missing from the
    package.

    --------------------------------------------------------------------------------

    18 Dec 2003
    RPM ethereal 0.9.14-115 (i586) 5259 kB
    Patch-RPM ethereal 0.9.14-115-patch (i586) 4853 kB
    Source-RPM ethereal-0.9.14-115.src.rpm  
    Security Update!
    Security Fix:
    This update fixes a crash condition in ethereal. The bug appears in the code
    that handles SMB packages (needs to be selected) and can be triggered remotely.

    --------------------------------------------------------------------------------

    18 Dec 2003
    RPM k_athlon 2.4.21-166 (i586) 25313 kB
    Source-RPM k_athlon-2.4.21-166.src.rpm  
    Security Update!
    Paul Starzetz of iSEC reported a vulnerability in the mremap system call,
    which allows local attackers to crash the machine, and even to obtain super
    user privileges under some circumstances.

    This update fixes the vulnerability.


    --------------------------------------------------------------------------------

    18 Dec 2003
    RPM k_deflt 2.4.21-166 (i586) 25211 kB
    Source-RPM k_deflt-2.4.21-166.src.rpm  
    Security Update!
    Paul Starzetz of iSEC reported a vulnerability in the mremap system call,
    which allows local attackers to crash the machine, and even to obtain super
    user privileges under some circumstances.

    This update fixes the vulnerability.


    --------------------------------------------------------------------------------

    18 Dec 2003
    RPM k_um 2.4.21-166 (i586) 30584 kB
    Source-RPM k_um-2.4.21-166.src.rpm  
    Security Update!
    Paul Starzetz of iSEC reported a vulnerability in the mremap system call,
    which allows local attackers to crash the machine, and even to obtain super
    user privileges under some circumstances.

    This update fixes the vulnerability.


    --------------------------------------------------------------------------------

    18 Dec 2003
    RPM kdepim3 3.1.4-45 (i586) 1621 kB
    Patch-RPM kdepim3 3.1.4-45-patch (i586) 288 kB
    Source-RPM kdepim3-3.1.4-45.src.rpm  
    Security Update!
    It was possible to use a buffer overflow via a special crafted vcard file
    to run code during generating previews. By default it was only possible
    on local filesystems, but the user can enable this also for remote file
    systems.

    --------------------------------------------------------------------------------

    18 Dec 2003
    RPM popper 1.0-727 (i586) 48 kB
    Patch-RPM popper 1.0-727-patch (i586) 39 kB
    Source-RPM popper-1.0-727.src.rpm  
    Security Update!
    This update fixes unsecure temp file handling.


    --------------------------------------------------------------------------------

    17 Dec 2003
    RPM cdrecord 2.01a18-60 (i586) 448 kB
    Patch-RPM cdrecord 2.01a18-60-patch (i586) 291 kB
    Source-RPM cdrecord-2.01a18-60.src.rpm  
    This update fixes a problem that prevented cdrecord from working
    on a machine running the Linux 2.6 kernel.

    Installations running the 2.4 kernel are unaffected.


    --------------------------------------------------------------------------------

    17 Dec 2003
    RPM kernel-source 2.4.21-166 (i586) 44236 kB
    Source-RPM kernel-source-2.4.21-166.src.rpm  
    Security Update!
    Paul Starzetz of iSEC reported a vulnerability in the mremap system call,
    which allows local attackers to crash the machine, and even to obtain super
    user privileges under some circumstances.

    This update fixes the vulnerability.


    --------------------------------------------------------------------------------

    16 Dec 2003
    RPM fontconfig 2.2.1-58 (i586) 127 kB
    Patch-RPM fontconfig 2.2.1-58-patch (i586) 9 kB
    Source-RPM fontconfig-2.2.1-58.src.rpm  
    The default for subpixel hinting is set to "none" in these updated
    fontconfig packages. If you switch off subpixel hinting in the
    KDE control centre, KDE removes all rules concerning subpixel hinting
    from ~/.fonts.conf, but the global default may still be to use
    subpixel hinting on some TFT displays. Making the global default "none"
    means you can really switch it off in the KDE control centre.

    --------------------------------------------------------------------------------

    16 Dec 2003
    RPM fontconfig-devel 2.2.1-58 (i586) 204 kB
    Patch-RPM fontconfig-devel 2.2.1-58-patch (i586) 33 kB
    Source-RPM fontconfig-2.2.1-58.src.rpm  
    The default for subpixel hinting is set to "none" in these updated
    fontconfig packages. If you switch off subpixel hinting in the
    KDE control centre, KDE removes all rules concerning subpixel hinting
    from ~/.fonts.conf, but the global default may still be to use
    subpixel hinting on some TFT displays. Making the global default "none"
    means you can really switch it off in the KDE control centre.

    --------------------------------------------------------------------------------

    15 Dec 2003
    RPM irssi 0.8.6-148 (i586) 691 kB
    Patch-RPM irssi 0.8.6-148-patch (i586) 479 kB
    Source-RPM irssi-0.8.6-148.src.rpm  
    Security Update!
    Security Fix:
    This update fixes a remote denial-of-service attack against irssi irc client.

    --------------------------------------------------------------------------------

    10 Dec 2003
    RPM lftp 2.6.6-71 (i586) 668 kB
    Patch-RPM lftp 2.6.6-71-patch (i586) 281 kB
    Source-RPM lftp-2.6.6-71.src.rpm  
    Security Update!
    Security Fix:
    This update fix' a remote exploitable buffer overflow while using HTTP/HTTPS.

    --------------------------------------------------------------------------------

    10 Dec 2003
    RPM perl 5.8.1-81 (i586) 12393 kB
    Patch-RPM perl 5.8.1-81-patch (i586) 5373 kB
    Source-RPM perl-5.8.1-81.src.rpm  
    Update to official perl-5.8.1; fix srand bug; fix problems with
    setenv in applications with embedd perl (e.g. mod_perl).

    --------------------------------------------------------------------------------

    08 Dec 2003
    RPM screen 4.0.1-33 (i586) 569 kB
    Patch-RPM screen 4.0.1-33-patch (i586) 168 kB
    Source-RPM screen-4.0.1-33.src.rpm  
    Security Update!
    Security fix for possibly remote privilege escalation in screen.


    --------------------------------------------------------------------------------

    04 Dec 2003
    RPM rsync 2.5.6-193 (i586) 226 kB
    Patch-RPM rsync 2.5.6-193-patch (i586) 179 kB
    Source-RPM rsync-2.5.6-193.src.rpm  
    Security Update!
    This update fixes an exploitable heap overflow in rsync.
    This problem has no security impact if rsync is run over
    an authenticated ssh connection or similar, because rsync
    runs with the privilege of the authenticated user.
    However, if rsync is run in server mode (i.e. invoked from
    inetd to handle anonymous downloads), the bug becomes security
    relevant.


    --------------------------------------------------------------------------------

    04 Dec 2003
    RPM unace 2.5-68 (i586) 212 kB
    Source-RPM unace-2.5-68.src.rpm  
    Security Update!
    Security Fix for buffer overflow with long file-names.


    --------------------------------------------------------------------------------

    01 Dec 2003
    RPM bastille 2.0.4-61 (i586) 239 kB
    Patch-RPM bastille 2.0.4-61-patch (i586) 25 kB
    Source-RPM bastille-2.0.4-61.src.rpm  
    Security Update!
    This update adds the missing symbolic link that permits bastille to work on SUSE LINUX 9.0.<!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->

    Oh wait, maybe those Debian guys are just extra moronic. I'm sure they have no need for all these patches over at Redhat; aftter all, they are the industry leader and have the most Linux marketshare for a reason right? Well, let's just take a look at their patch server and...

    <!--QuoteBegin--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> </td></tr><tr><td id='QUOTE'><!--QuoteEBegin--> Parent Directory                12-Nov-2003 02:03      - 
    SRPMS/                          11-Feb-2004 14:11      - 
    bash-2.05b-34.i386.rpm          23-Dec-2003 10:30  1.5M 
    binutils-2.14.90.0.6-4.i386.rpm  19-Dec-2003 10:43  2.7M 
    debug/                          11-Feb-2004 14:11      - 
    dia-0.92.2-1.i386.rpm            19-Dec-2003 10:03  2.3M 
    epic-1.0.1-16.i386.rpm          12-Nov-2003 15:37  673k 
    ethereal-0.10.0a-0.1.i386.rpm    18-Dec-2003 11:22  3.3M 
    ethereal-gnome-0.10.0a-0.1.i3..> 18-Dec-2003 11:22  2.5M 
    foomatic-3.0.0-21.3.i386.rpm    11-Feb-2004 11:54  2.0M 
    gaim-0.74-5.i386.rpm            05-Dec-2003 15:15  2.4M 
    gdm-2.4.4.5-1.2.i386.rpm        10-Feb-2004 10:27  1.9M 
    ghostscript-7.07-15.1.i386.rpm  11-Feb-2004 12:01  7.5M 
    ghostscript-devel-7.07-15.1.i..> 11-Feb-2004 12:01    32k 
    gimp-print-4.2.6-4.i386.rpm      11-Feb-2004 12:05  2.3M 
    gimp-print-cups-4.2.6-4.i386.rpm 11-Feb-2004 12:05  19.0M 
    gimp-print-devel-4.2.6-4.i386..> 11-Feb-2004 12:05  546k 
    gimp-print-plugin-4.2.6-4.i38..> 11-Feb-2004 12:05    45k 
    gimp-print-utils-4.2.6-4.i386..> 11-Feb-2004 12:05    19k 
    glibc-2.3.2-101.1.i386.rpm      14-Nov-2003 12:19  3.3M 
    glibc-2.3.2-101.1.i686.rpm      14-Nov-2003 12:19  4.9M 
    glibc-2.3.2-101.4.i386.rpm      12-Jan-2004 08:55  3.3M 
    glibc-2.3.2-101.4.i686.rpm      12-Jan-2004 08:55  4.9M 
    glibc-common-2.3.2-101.1.i386..> 14-Nov-2003 12:19  12.3M 
    glibc-common-2.3.2-101.4.i386..> 12-Jan-2004 08:55  12.3M 
    glibc-debug-2.3.2-101.1.i386.rpm 14-Nov-2003 12:19  23.0M 
    glibc-debug-2.3.2-101.4.i386.rpm 12-Jan-2004 08:55  23.0M 
    glibc-devel-2.3.2-101.1.i386.rpm 14-Nov-2003 12:19  1.8M 
    glibc-devel-2.3.2-101.4.i386.rpm 12-Jan-2004 08:55  1.8M 
    glibc-headers-2.3.2-101.1.i38..> 14-Nov-2003 12:19  507k 
    glibc-headers-2.3.2-101.4.i38..> 12-Jan-2004 08:55  507k 
    glibc-profile-2.3.2-101.1.i38..> 14-Nov-2003 12:19  1.0M 
    glibc-profile-2.3.2-101.4.i38..> 12-Jan-2004 08:55  1.0M 
    glibc-utils-2.3.2-101.1.i386.rpm 14-Nov-2003 12:19    67k 
    glibc-utils-2.3.2-101.4.i386.rpm 12-Jan-2004 08:55    69k 
    gnome-libs-1.4.1.2.90-36.i386..> 09-Feb-2004 10:12  1.0M 
    gnome-libs-devel-1.4.1.2.90-3..> 09-Feb-2004 10:12  1.1M 
    gnucash-1.8.8-1.i386.rpm        18-Dec-2003 12:15  7.4M 
    gnucash-backend-postgres-1.8...> 18-Dec-2003 12:15  107k 
    gnupg-1.2.3-2.i386.rpm          10-Dec-2003 22:06  1.5M 
    gphoto2-2.1.3-1.i386.rpm        23-Dec-2003 10:30  872k 
    gphoto2-devel-2.1.3-1.i386.rpm  23-Dec-2003 10:30  105k 
    grep-2.5.1-17.4.i386.rpm        10-Dec-2003 12:46  169k 
    headers/                        11-Feb-2004 14:11      - 
    hpijs-1.5-4.1.i386.rpm          11-Feb-2004 12:01  173k 
    httpd-2.0.48-1.2.i386.rpm        07-Jan-2004 11:59  1013k 
    httpd-devel-2.0.48-1.2.i386.rpm  07-Jan-2004 11:59  146k 
    httpd-manual-2.0.48-1.2.i386.rpm 07-Jan-2004 11:59  1.2M 
    initscripts-7.42.2-1.i386.rpm    01-Dec-2003 14:34  621k 
    iptables-1.2.9-1.0.i386.rpm      04-Feb-2004 08:03  168k 
    iptables-devel-1.2.9-1.0.i386..> 04-Feb-2004 08:03    39k 
    iptables-ipv6-1.2.9-1.0.i386.rpm 04-Feb-2004 08:03  115k 
    kernel-2.4.22-1.2140.nptl.ath..> 07-Jan-2004 11:39  12.0M 
    kernel-2.4.22-1.2140.nptl.i58..> 07-Jan-2004 11:39  12.0M 
    kernel-2.4.22-1.2140.nptl.i68..> 07-Jan-2004 11:39  12.2M 
    kernel-2.4.22-1.2149.nptl.ath..> 13-Jan-2004 14:55  12.0M 
    kernel-2.4.22-1.2149.nptl.i58..> 13-Jan-2004 14:56  12.0M 
    kernel-2.4.22-1.2149.nptl.i68..> 13-Jan-2004 14:56  12.2M 
    kernel-2.4.22-1.2166.nptl.ath..> 10-Feb-2004 14:30  12.1M 
    kernel-2.4.22-1.2166.nptl.i58..> 10-Feb-2004 14:30  12.1M 
    kernel-2.4.22-1.2166.nptl.i68..> 10-Feb-2004 14:30  12.3M 
    kernel-BOOT-2.4.22-1.2140.npt..> 07-Jan-2004 11:39  6.4M 
    kernel-BOOT-2.4.22-1.2149.npt..> 13-Jan-2004 14:55  6.4M 
    kernel-BOOT-2.4.22-1.2166.npt..> 10-Feb-2004 14:30  6.4M 
    kernel-doc-2.4.22-1.2140.nptl..> 07-Jan-2004 11:39  1.7M 
    kernel-doc-2.4.22-1.2149.nptl..> 13-Jan-2004 14:55  1.7M 
    kernel-doc-2.4.22-1.2166.nptl..> 10-Feb-2004 14:30  1.7M 
    kernel-smp-2.4.22-1.2140.nptl..> 07-Jan-2004 11:39  12.5M 
    kernel-smp-2.4.22-1.2140.nptl..> 07-Jan-2004 11:39  12.7M 
    kernel-smp-2.4.22-1.2149.nptl..> 13-Jan-2004 14:55  12.5M 
    kernel-smp-2.4.22-1.2149.nptl..> 13-Jan-2004 14:56  12.7M 
    kernel-smp-2.4.22-1.2166.nptl..> 10-Feb-2004 14:30  12.5M 
    kernel-smp-2.4.22-1.2166.nptl..> 10-Feb-2004 14:30  12.8M 
    kernel-source-2.4.22-1.2140.n..> 07-Jan-2004 11:39  39.4M 
    kernel-source-2.4.22-1.2149.n..> 13-Jan-2004 14:55  39.4M 
    kernel-source-2.4.22-1.2166.n..> 10-Feb-2004 14:30  39.5M 
    lftp-2.6.10-1.i386.rpm          12-Dec-2003 18:24  577k 
    mc-4.6.0-8.4.i386.rpm            09-Feb-2004 10:14  1.5M 
    mod_python-3.0.4-0.1.i386.rpm    04-Feb-2004 10:04  481k 
    mod_ssl-2.0.48-1.2.i386.rpm      07-Jan-2004 11:59    82k 
    mozilla-1.4.1-18.i386.rpm        19-Nov-2003 10:26  14.3M 
    mozilla-chat-1.4.1-18.i386.rpm  19-Nov-2003 10:26  119k 
    mozilla-devel-1.4.1-18.i386.rpm  19-Nov-2003 10:26  3.2M 
    mozilla-dom-inspector-1.4.1-1..> 19-Nov-2003 10:26  160k 
    mozilla-js-debugger-1.4.1-18...> 19-Nov-2003 10:26  209k 
    mozilla-mail-1.4.1-18.i386.rpm  19-Nov-2003 10:26  1.8M 
    mozilla-nspr-1.4.1-18.i386.rpm  19-Nov-2003 10:26  103k 
    mozilla-nspr-devel-1.4.1-18.i..> 19-Nov-2003 10:26  174k 
    mozilla-nss-1.4.1-18.i386.rpm    19-Nov-2003 10:26  621k 
    mozilla-nss-devel-1.4.1-18.i3..> 19-Nov-2003 10:26  475k 
    mutt-1.4.1-5.i386.rpm            11-Feb-2004 14:11  1.1M 
    net-snmp-5.1-2.1.i386.rpm        11-Dec-2003 09:54  1.7M 
    net-snmp-devel-5.1-2.1.i386.rpm  11-Dec-2003 09:54  1.0M 
    net-snmp-perl-5.1-2.1.i386.rpm  11-Dec-2003 09:54  156k 
    net-snmp-utils-5.1-2.1.i386.rpm  11-Dec-2003 09:54  149k 
    netpbm-9.24-12.1.1.i386.rpm      06-Feb-2004 10:31    92k 
    netpbm-devel-9.24-12.1.1.i386..> 06-Feb-2004 10:31  120k 
    netpbm-progs-9.24-12.1.1.i386..> 06-Feb-2004 10:31  1.2M 
    nptl-devel-2.3.2-101.1.i686.rpm  14-Nov-2003 12:19  887k 
    nptl-devel-2.3.2-101.4.i686.rpm  12-Jan-2004 08:55  889k 
    nscd-2.3.2-101.1.i386.rpm        14-Nov-2003 12:19    65k 
    nscd-2.3.2-101.4.i386.rpm        12-Jan-2004 08:55    67k 
    nss_ldap-207-6.i386.rpm          09-Feb-2004 16:40  913k 
    pam_krb5-2.0.5-1.i386.rpm        09-Feb-2004 16:41    53k 
    pango-1.2.5-4.i386.rpm          09-Feb-2004 14:39  341k 
    pango-devel-1.2.5-4.i386.rpm    09-Feb-2004 14:39  134k 
    php-4.3.4-1.1.i386.rpm          07-Jan-2004 11:59  3.5M 
    php-devel-4.3.4-1.1.i386.rpm    07-Jan-2004 11:59  233k 
    php-domxml-4.3.4-1.1.i386.rpm    07-Jan-2004 11:59    43k 
    php-imap-4.3.4-1.1.i386.rpm      07-Jan-2004 11:59  419k 
    php-ldap-4.3.4-1.1.i386.rpm      07-Jan-2004 11:59    27k 
    php-mysql-4.3.4-1.1.i386.rpm    07-Jan-2004 11:59    28k 
    php-odbc-4.3.4-1.1.i386.rpm      07-Jan-2004 11:59    33k 
    php-pgsql-4.3.4-1.1.i386.rpm    07-Jan-2004 11:59    42k 
    php-snmp-4.3.4-1.1.i386.rpm      07-Jan-2004 11:59    20k 
    php-xmlrpc-4.3.4-1.1.i386.rpm    07-Jan-2004 11:59    44k 
    postgresql-7.3.4-11.i386.rpm    25-Nov-2003 16:18  1.6M 
    postgresql-contrib-7.3.4-11.i..> 25-Nov-2003 16:18  339k 
    postgresql-devel-7.3.4-11.i38..> 25-Nov-2003 16:18  1.4M 
    postgresql-docs-7.3.4-11.i386..> 25-Nov-2003 16:18  4.5M 
    postgresql-jdbc-7.3.4-11.i386..> 25-Nov-2003 16:18  186k 
    postgresql-libs-7.3.4-11.i386..> 25-Nov-2003 16:18    89k 
    postgresql-pl-7.3.4-11.i386.rpm  25-Nov-2003 16:18  379k 
    postgresql-python-7.3.4-11.i3..> 25-Nov-2003 16:18    42k 
    postgresql-server-7.3.4-11.i3..> 25-Nov-2003 16:18  2.6M 
    postgresql-tcl-7.3.4-11.i386.rpm 25-Nov-2003 16:18    26k 
    postgresql-test-7.3.4-11.i386..> 25-Nov-2003 16:18  1.1M 
    privoxy-3.0.3-1.i386.rpm        04-Feb-2004 08:06  500k 
    procps-2.0.17-5.i386.rpm        09-Dec-2003 10:14  156k 
    pstack-1.2-3.i386.rpm            12-Nov-2003 23:03    18k 
    quagga-0.96.4-0.fc1.i386.rpm    09-Dec-2003 23:28  1.2M 
    quagga-contrib-0.96.4-0.fc1.i..> 09-Dec-2003 23:28    11k 
    quagga-devel-0.96.4-0.fc1.i38..> 09-Dec-2003 23:28  332k 
    rdesktop-1.3.0-2.i386.rpm        30-Jan-2004 02:00    69k 
    redhat-config-packages-1.2.7-..> 24-Nov-2003 15:29  159k 
    redhat-config-printer-0.6.79...> 12-Dec-2003 14:37  833k 
    redhat-config-printer-gui-0.6..> 12-Dec-2003 14:37    95k 
    rhdb-utils-2.0-2.i386.rpm        25-Nov-2003 17:26    20k 
    rhn-applet-2.1.4-3.i386.rpm      26-Nov-2003 10:16  271k 
    rsync-2.5.7-2.i386.rpm          04-Dec-2003 15:25  130k 
    sed-4.0.8-2.i386.rpm            19-Dec-2003 10:43  117k 
    slocate-2.7-4.i386.rpm          26-Jan-2004 14:14    33k 
    strace-4.5.1-1.i386.rpm          14-Nov-2003 00:52    76k 
    vnc-4.0-0.beta4.3.2.i386.rpm    17-Nov-2003 14:31  147k 
    vnc-server-4.0-0.beta4.3.2.i3..> 17-Nov-2003 14:31  1.3M 
    xboard-4.2.7-1.i386.rpm          04-Dec-2003 11:33  276k  <!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->

    Wow, weird, they have tons of patches too!

    Wow, I feel an uncontrollable urge to point out how many flaws those idiot linux developers have allowed in their code. I mean, releasing patches is bad right? We have a zero-tolerance bug rule in computing after all, right?

    Man, where would the internet be without logic like this...
  • CForresterCForrester P0rk(h0p Join Date: 2002-10-05 Member: 1439Members, Constellation
    Please don't start an argument in this thread about Windows VS Linux, everyone. I only posted this to inform people that a new, important patch is out and that they should apply it if they run one of the listed operating systems.
  • MonsieurEvilMonsieurEvil Join Date: 2002-01-22 Member: 4Members, Retired Developer, NS1 Playtester, Contributor
    Sorry CF, you are right. Ranting over...
  • GadzukoGadzuko Join Date: 2002-12-26 Member: 11556Members, Constellation
    Besides, I think the amount of smack MonsE just laid down is enough for one day.
  • TalesinTalesin Our own little well of hate Join Date: 2002-11-08 Member: 7710NS1 Playtester, Forum Moderators
    Now compare how many of those are functionality and stability cementing updates, versus externally-exploitable-by-a-retarded-monkey, as the 'latest' gaping MS bug is. I see... none? Maybe three altogether that could be exploited /period/ by a remote attacker, all of which requiring enough of a brain to place it out of a script kiddiot's league?

    Have to also note that you've listed stuff like the patches for gAIM (a multi-protocol IM client), at least two of which are to update the handlers as MSN and Yahoo changed their protocols no less than four times in the last month.
    And cups... enhanced printer support.
    mpg321... gotta be careful, never know when there might be an exploit hidden in that MP3 you've been listening to for years.

    If anything, I'd say that list is almost solid points /for/ Linux, rather than against.
    Not to mention that those patches are for a computing environment. It'd be like listing the Half-Life patches, Photoshop patches, Trillian patches, and Maya patches along with the stuff MS has had to toss out.


    In any case, this probably would be better back in the Linux discussion thread.
  • CForresterCForrester P0rk(h0p Join Date: 2002-10-05 Member: 1439Members, Constellation
    Do you guys have an alarm on your desk that goes off every time someone says "Microsoft", "Windows" or "Linux" in a thread? <!--emo&:p--><img src='http://www.unknownworlds.com/forums/html//emoticons/tounge.gif' border='0' style='vertical-align:middle' alt='tounge.gif' /><!--endemo-->
  • MonsieurEvilMonsieurEvil Join Date: 2002-01-22 Member: 4Members, Retired Developer, NS1 Playtester, Contributor
    <!--QuoteBegin-Talesin+Feb 11 2004, 03:59 PM--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> (Talesin @ Feb 11 2004, 03:59 PM)</td></tr><tr><td id='QUOTE'><!--QuoteEBegin--> Now compare how many of those are functionality and stability cementing updates, versus externally-exploitable-by-a-retarded-monkey, as the 'latest' gaping MS bug is. I see... none? Maybe three altogether that could be exploited /period/ by a remote attacker, all of which requiring enough of a brain to place it out of a script kiddiot's league? <!--QuoteEnd--> </td></tr></table><div class='postcolor'> <!--QuoteEEnd-->
    So this list from Mandrake right shows that Linux has no security patches?

    <a href='http://www.mandrakesecure.net/en/advisories/updates.php?dis=9.2' target='_blank'>http://www.mandrakesecure.net/en/advisorie...tes.php?dis=9.2</a>

    <!--QuoteBegin--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> </td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->Date  Advisory  Synopsis 
      2004-01-30  MDKSA-2004:006-1  Updated gaim packages fix multiple vulnerabilities 
      2004-01-28  MDKA-2004:009  Updated php-ini package fix module location 
      2004-01-26  MDKSA-2004:008  Updated tcpdump packages fix several vulnerabilities 
      2004-01-26  MDKSA-2004:007  Updated mc packages fix buffer overflow vulnerability 
      2004-01-26  MDKSA-2004:006  Updated gaim packages fix multiple vulnerabilities 
      2004-01-23  MDKSA-2004:005  Updated jabber packages fix DoS vulnerability 
      2004-01-23  MDKSA-2004:004  Updated slocate packages fix vulnerability 
      2004-01-23  MDKA-2004:008  Updated mrproject package fix segfault 
      2004-01-22  MDKA-2004:007  Updated dhcp package fix problems with dynamic DNS 
      2004-01-22  MDKA-2004:005-1  Updated qt3 package fix problems with accelerator keys 
      2004-01-20  MDKA-2004:006  Updated drakxtools package fix problems with drakconnect 
      2004-01-14  MDKSA-2004:003  Updated kdepim packages fix vulnerability 
      2004-01-14  MDKA-2004:005  Updated qt3 package fix problems with accelerator keys 
      2004-01-14  MDKA-2004:004  Updated kdegames package fix crash with kwin4 
      2004-01-14  MDKA-2004:003  Updated krozat package fix memory leak 
      2004-01-13  MDKSA-2004:002  Updated ethereal packages fix vulnerabilities 
      2004-01-07  MDKSA-2004:001  Updated kernel packages fix local root vulnerability 
      2004-01-05  MDKA-2004:001  Updated drakxtools package fixes drakbackup's daemon behavior. 
      2003-12-31  MDKSA-2003:095-1  Updated proftpd packages fix remote root vulnerability 
      2003-12-19  MDKSA-2003:118  Updated XFree86 packages fix xdm vulnerability 
      2003-12-18  MDKSA-2003:117  Updated irssi packages fix remote crash 
      2003-12-18  MDKA-2003:039  Updated chkauth packages fix NIS support 
      2003-12-18  MDKA-2003:038  Updated GConf2 packages fix patch 
      2003-12-15  MDKSA-2003:116  Updated lftp packages fix buffer overflow vulnerability 
      2003-12-11  MDKSA-2003:115  Updated net-snmp packages fix vulnerability 
      2003-12-10  MDKSA-2003:114  Updated ethereal packages fix multiple remotely exploitable vulnerabilities 
      2003-12-10  MDKSA-2003:112-1  Updated cvs packages fix malformed module request vulnerability 
      2003-12-10  MDKA-2003:037  Updated gaim packages restore MSN support 
      2003-12-08  MDKSA-2003:113  Updated screen packages fix buffer overflow vulnerability 
      2003-12-08  MDKSA-2003:112  Updated cvs packages fix malformed module request vulnerability 
      2003-12-04  MDKSA-2003:111  Updated rsync packages fix heap overflow vulnerability 
      2003-12-04  MDKA-2003:036  Updated shorewall packages fix loading of modules 
      2003-12-04  MDKA-2003:030-1  Updated rpm packages fix database locking bug 
      2003-12-02  MDKA-2003:035  Updated dump packages fix bug in rmt 
      2003-12-02  MDKA-2003:034  Updated mandrake_doc packages provide updated documentation 
      2003-12-01  MDKA-2003:027-2  Updated drakxtools packages fix multiple bugs 
      2003-11-28  MDKSA-2003:109  Updated gnupg packages fix vulnerability with ElGamal signing keys 
      2003-11-28  MDKA-2003:033  Updated kde-i18n-es packages fix translation problems in kmail 
      2003-11-28  MDKA-2003:032  Updated kopete packages fix MSN compatibility 
      2003-11-25  MDKA-2003:027-1  Updated drakxtools packages fix multiple bugs 
      2003-11-18  MDKA-2003:030  Updated rpm packages fix database locking bug 
      2003-11-18  MDKA-2003:029  Updated nss_ldap packages fix dependency problem 
      2003-11-18  MDKA-2003:028  Updated gawk packages fix segfault 
      2003-11-14  MDKA-2003:027  Updated drakxtools packages fix multiple bugs 
      2003-11-12  MDKSA-2003:106  Updated fileutils and coreutils packages fix vulnerabilities 
      2003-11-12  MDKA-2003:026  Updated SnortSnarf packages fix dependency problems 
      2003-11-12  MDKA-2003:025  Updated totem packages fix crash 
      2003-11-12  MDKA-2003:024  Updated OpenDX packages fix problem starting dx 
      2003-11-11  MDKSA-2003:105  Updated hylafax packages fix remote root vulnerability 
      2003-11-03  MDKSA-2003:103  Updated apache packages fix vulnerabilities 
      2003-10-31  MDKA-2003:023  Updated libbonobo packages fix problems with users on NFS homes 
      2003-10-31  MDKA-2003:022  Updated GConf packages fix problem starting gnucash 
      2003-10-27  MDKA-2003:021  Updated kernel packages problems with LG-based CD-ROM drives 
      2003-10-24  MDKSA-2003:096-1  Updated apache2 packages fix CGI scripting deadlock 
      2003-10-22  MDKA-2003:020  Updated packages fix various bugs in Mandrake Linux 9.2 
      2003-10-16  MDKSA-2003:101  Updated fetchmail packages fix DoS vulnerability 
      2003-10-16  MDKSA-2003:100  Updated gdm packages fix local vulnerabilities 
      2003-10-08  MDKA-2003:018  Updated gnome-applets packages fix the Stock Ticker applet 
      2003-09-30  MDKSA-2003:098  Updated openssl packages fix vulnerabilities 
      2003-09-30  MDKSA-2003:097  Updated mplayer packages fix buffer overflow vulnerability 
      2003-09-26  MDKSA-2003:095  Updated proftpd packages fix remote root vulnerability 
    <!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->

    Are you actually trying to argue that Linux does not or should not patch security holes?
  • TalesinTalesin Our own little well of hate Join Date: 2002-11-08 Member: 7710NS1 Playtester, Forum Moderators
    And now you know one reason that I do my best to dissuade newbies from Mandrake. It's notoriously the least stable Linux distro available. Though it's good to see they're at least attempting to fix some of their problems. <!--emo&:)--><img src='http://www.unknownworlds.com/forums/html//emoticons/smile.gif' border='0' style='vertical-align:middle' alt='smile.gif' /><!--endemo-->

    Also, a good portion of those are, again, LOCAL exploits. Meaning you can't get hit from just visiting an URL. The others require a touch more intelligence to accomplish, unlike the aforementioned 'latest gaping hole'.

    And once again, you're listing application patches along with the OS-level.
    Ain't it a pain that IE counts as part of the OS, with Microsoft claiming that they can't be seperated and all? ^_^
  • Hand_Me_The_Gun_And_Ask_Me_AgainHand_Me_The_Gun_And_Ask_Me_Again Join Date: 2002-02-07 Member: 178Members
    <!--QuoteBegin-MonsieurEvil+Feb 11 2004, 09:25 PM--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> (MonsieurEvil @ Feb 11 2004, 09:25 PM)</td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->Are you actually trying to argue that Linux does not or should not patch security holes?<!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->
    I think he's arguing the opposite; <i>everything</i> gets patched, whether it's a gaping security hole, a crash-inducing bug, a theoretical security risk under certain configurations or just an annoying misfeature.

    I've had the SuSE update notification utility running since I installed 9.0; few of the updates have been critical ones, and even fewer have affected some base functionality like the kernel.

    Yes, flaws are present in all software, but I think I prefer the free software mentality of patching things straight away instead of sitting on things for months.
  • MedHeadMedHead Join Date: 2002-12-19 Member: 11115Members, Constellation
    Must Microsoft related threads attract Linux users on a mission? It's an operating system - surely there are better things over which to argue.
  • MonsieurEvilMonsieurEvil Join Date: 2002-01-22 Member: 4Members, Retired Developer, NS1 Playtester, Contributor
    I chose Mandrake at random. Tal, you are living in a world of what we call 'the double standard'. Here's my take on it: as long as you use a double standard, no one will ever take Linux fans seriously. This is why slashdot and such are laughing stocks in the IT world (including from most Linux admins that I know) - if MS releases a patch, it's bad coding; if Linux does, it's good security.

    I list the apps because the vendor lists them. Your linux web server isn't much use without web services, and if Apache lets you get rooted that's a problem with both. If I go to <a href='http://www.linuxsecurity.com/advisories/index.html' target='_blank'>http://www.linuxsecurity.com/advisories/index.html</a> and start browsing, I see things like:

    <!--QuoteBegin--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> </td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->2/4/2004 10:32 - Debian: kernel Privilage escalation MIPS patch
    Integer overflow in the do_brk() function of the Linux kernel allows local users to gain root privileges
    <!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->
    <!--QuoteBegin--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> </td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->2/3/2004 22:30 - Red Hat: kernel Multiple vulnerabilities
    Updated kernel packages are now available that fix a few security issues.
    <!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->
    <!--QuoteBegin--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> </td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->2/6/2004 17:58 - Red Hat: netpbm Red Hat: 'netpbm' temporary file vulnerabilities
    A number of temporary file bugs have been found in versions of NetPBM. These could allow a local user the ability to overwrite or create files as a different user who happens to run one of the the vulnerable utilities.
    <!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->

    This page alone just shows the last week, and that's 17 separate security patches. If you look into the distro-specific ones on the side you will see hundreds more. Patches are a fact of life. Bugs are a fact of life. Saying that Linux patches are good and MS patches are bad is simply being fanatical and illogical; two things that I find very disagreeable in a system engineer or architect - you have to be flexible and open to various ideas to be a good one.

    I get made out to be an MS lover, but in reality I have worked on many different OS's in my professional career, be it MS, Linux, HP Unix, Sun Solaris, Netware, OS/2, Mac, and others. All of them have problems, all of them have advantages. Blindly denouncing one over the other simply shows either a lack of experience or a predisposition towards stubborn pigheadedness.
  • That_Annoying_KidThat_Annoying_Kid Sire of Titles Join Date: 2003-03-01 Member: 14175Members, Constellation
    This has to be the biggest 14 posts on one page that I have ever seen


    <!--emo&:D--><img src='http://www.unknownworlds.com/forums/html//emoticons/biggrin.gif' border='0' style='vertical-align:middle' alt='biggrin.gif' /><!--endemo-->
  • MonsieurEvilMonsieurEvil Join Date: 2002-01-22 Member: 4Members, Retired Developer, NS1 Playtester, Contributor
    edited February 2004
    <!--QuoteBegin--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> </td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->Yes, flaws are present in all software, but I think I prefer the free software mentality of patching things straight away instead of sitting on things for months.<!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->
    Why is it then that if I go down the security patch list at <a href='http://www.linuxsecurity.com/advisories/index.html' target='_blank'>http://www.linuxsecurity.com/advisories/index.html</a> via OS, I see differences of weeks or months between patch releases for the exact same issues, depending on the vendors? Because *ding ding ding* releasing a patch straight away without properly testing it leads to releasing application patches to fix your security patches. Large corporations don't care if you release a patch 24 hours after a vulnerability is released - they can't release it to 3000 servers right away unless they go through and test it out themselves, run through their own procedures, and verify that it doesn't break a database in the quest to secure it. They feel much more comfortable with patches that obviously got some thorough burn-in testing. I'm not speaking from opinion, just experience.
  • MedHeadMedHead Join Date: 2002-12-19 Member: 11115Members, Constellation
    edited February 2004
    Hasn't the "rush the patch to fix the problem, then rush another patch to fix the patch" been a complaint of Half Life users since the game was released? I remember Valve getting a lot of flack for their patch releases.
  • AsranielAsraniel Join Date: 2002-06-03 Member: 724Members, Playtest Lead, Forum Moderators, NS2 Playtester, Squad Five Blue, Reinforced - Shadow, WC 2013 - Shadow, Subnautica Playtester, Retired Community Developer
    The difference is that the bugs GET fixed.... and that hours after the hole has been detected and not 6 moths


    And Mr.Evil, its great what for fixes you list there... like MC, wich is a programm, second, its a console filemanager(i mean... how many times a attacker gets acces to a local konsole file manager???).... i could programm a crappy programm for windows with thousends of bugs in it and then blame M$ that they have bugged software....
  • TalesinTalesin Our own little well of hate Join Date: 2002-11-08 Member: 7710NS1 Playtester, Forum Moderators
    Still, you're listing a lot of local user vulnerabilities, MonsE. Nothing that could blow your system wide open to an EXTERNAL ATTACKER.

    Much less something as stupid as, say, typing an URL. Or better yet, renaming an .XML as .JPG (which only works as IE ignores MIME filetype extensions and guesses every time... which is in direct standards violation).


    Wanna talk Apache bugs? Sendmail? FTPd? Compare to the disaster that is IIS.
    Perhaps browsers are more your cup of tea. After all, end-users are more likely to be running them rather than web services. IE versus Mozilla, or Konqueror, or lynx if you like.
    Outlook Express going head to head with MozMail or pine.

    In short, if we're going by comparison, there is no contest.
    What few Linux vulnerabilities there have been are lesser in scope, more difficult to understand or exploit (to the majority of those who would take advantage of it), and tend to have a quicker turnaround time on a patch, when neccessary.
    Windows is notorious for its security flaws, instability, and overhead. It appears more to be a daily scramble from patch to patch, just trying to get the worst of it hammered shut, while another leak springs up, hoping no one will notice or see.
  • MedHeadMedHead Join Date: 2002-12-19 Member: 11115Members, Constellation
    <!--QuoteBegin-Asraniel+Feb 11 2004, 06:46 PM--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> (Asraniel @ Feb 11 2004, 06:46 PM)</td></tr><tr><td id='QUOTE'><!--QuoteEBegin--> The difference is that the bugs GET fixed.... and that hours after the hole has been detected and not 6 moths
    <!--QuoteEnd--> </td></tr></table><div class='postcolor'> <!--QuoteEEnd-->
    Are you talking about Valve? Because when I say they "rushed" a patch, I didn't mean it came out quickly. It just came out sooner than usual.
  • MonsieurEvilMonsieurEvil Join Date: 2002-01-22 Member: 4Members, Retired Developer, NS1 Playtester, Contributor
    <!--QuoteBegin-Talesin+Feb 11 2004, 05:47 PM--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> (Talesin @ Feb 11 2004, 05:47 PM)</td></tr><tr><td id='QUOTE'><!--QuoteEBegin--> Still, you're listing a lot of local user vulnerabilities, MonsE. Nothing that could blow your system wide open to an EXTERNAL ATTACKER.

    Much less something as stupid as, say, typing an URL. Or better yet, renaming an .XML as .JPG (which only works as IE ignores MIME filetype extensions and guesses every time... which is in direct standards violation).


    Wanna talk Apache bugs? Sendmail? FTPd? Compare to the disaster that is IIS.
    Perhaps browsers are more your cup of tea. After all, end-users are more likely to be running them rather than web services. IE versus Mozilla, or Konqueror, or lynx if you like.
    Outlook Express going head to head with MozMail or pine.

    In short, if we're going by comparison, there is no contest.
    What few Linux vulnerabilities there have been are lesser in scope, more difficult to understand or exploit (to the majority of those who would take advantage of it), and tend to have a quicker turnaround time on a patch, when neccessary.
    Windows is notorious for its security flaws, instability, and overhead. It appears more to be a daily scramble from patch to patch, just trying to get the worst of it hammered shut, while another leak springs up, hoping no one will notice or see. <!--QuoteEnd--> </td></tr></table><div class='postcolor'> <!--QuoteEEnd-->
    Well, I can see you're not open to real discussion. You win, I surrendor, Linux is gr8, MS$ sux, go back to /. where you can talk without benfit of thought.

    Oh, and make sure you say hi to Debian on the way over. After all, their main development servers were rooted just a couple months ago by an EXTERNAL ATTACKER because they have infallible software. See, I can type in all fanatical caps too, it's easy.

    You still have the double-standard and refuse to address it: when MS has a patch, it's bad coding. When Linux has a patch, it's good security. I especially like where you refer to things as 'notorious', that shows such impartiality. ^_^
  • SkulkBaitSkulkBait Join Date: 2003-02-11 Member: 13423Members
    I'd just like to point out that there is a perfectly good WinVSLin thread over in discussions. There really isn't a need to continue to derail this one.
  • AsranielAsraniel Join Date: 2002-06-03 Member: 724Members, Playtest Lead, Forum Moderators, NS2 Playtester, Squad Five Blue, Reinforced - Shadow, WC 2013 - Shadow, Subnautica Playtester, Retired Community Developer
    <!--QuoteBegin--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> </td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->Are you talking about Valve? Because when I say they "rushed" a patch, I didn't mean it came out quickly. It just came out sooner than usual.<!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->
    I was talking about Linux. And we all know that valve is a M$ controlled firm....
  • Hand_Me_The_Gun_And_Ask_Me_AgainHand_Me_The_Gun_And_Ask_Me_Again Join Date: 2002-02-07 Member: 178Members
    <!--QuoteBegin-MonsieurEvil+Feb 11 2004, 10:26 PM--></div><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td><b>QUOTE</b> (MonsieurEvil @ Feb 11 2004, 10:26 PM)</td></tr><tr><td id='QUOTE'><!--QuoteEBegin-->Large corporations don't care if you release a patch 24 hours after a vulnerability is released - they can't release it to 3000 servers right away unless they go through and test it out themselves, run through their own procedures, and verify that it doesn't break a database in the quest to secure it.<!--QuoteEnd--></td></tr></table><div class='postcolor'><!--QuoteEEnd-->
    Yeah, the testing. I realised I'd forgotten to mention it as soon as I clicked on the 'Add Reply' button. It's what you're paying the company building the Linux distribution for, after all - testing the patch, and if necessary backporting it to the version of the software used in your particular distribution, blah blah blah.

    Very similar for Windows, really, but for 'distribution' read 'version of Windows', etc.

    Microsoft is in a pretty unenviable position - they announce a patch for an as-yet-unknown-in-the-wild security vulnerability, and people go wild. I bet there'll still be people studiously ignoring the patches (the 'why would anyone want to hack me?' mentality) and complaining in a few months time when their machine gets broken by a worm.

    The moral of the story? Appreciate your sysadmin more, whatever their computing persuasion. Go on, people, buy him/her a box of chocolates. <!--emo&:)--><img src='http://www.unknownworlds.com/forums/html//emoticons/smile.gif' border='0' style='vertical-align:middle' alt='smile.gif' /><!--endemo-->
  • GeminosityGeminosity :3 Join Date: 2003-09-08 Member: 20667Members
    uh... sorry to break all the arguing but do we need to install this patch seperately or will windows update include this with it's 'critical updates and service packs' updater part thingy?
  • MonsieurEvilMonsieurEvil Join Date: 2002-01-22 Member: 4Members, Retired Developer, NS1 Playtester, Contributor
    It's a critical update - just run the Windows Update shortcut from your start menu, IE tools option, control panel, or system tray. It will automatically queue it for you to install.
  • GeminosityGeminosity :3 Join Date: 2003-09-08 Member: 20667Members
    ah coolies... the way it was posted and stuff I was just worried it might have been a manual patch or something =3

    thanks monse ^^
  • TalesinTalesin Our own little well of hate Join Date: 2002-11-08 Member: 7710NS1 Playtester, Forum Moderators
    edited February 2004
    Y'know, MonsE.. it's pretty easy to attempt to write off an opponent's viewpoint with ridicule. It takes far more effort to actually debate.

    As for the Debian rooting, if you looked a bit closer you'd see that the cause of that was OpenSSH.
    Oh, and a patch was released within hours. Not next-day... within <i>hours</i> to fix the overflow vulnerability.

    Impartial or not, are you going to deny that Windows is notorious for its security holes? Nobody said I was impartial. Hell, I wouldn't be debating if I was. That does not, however, immediately classify me as a 'fanatic'. I simply have a firmer grasp on the details of computing than most care to, and have formed opinions based on that experience.
  • ZunniZunni The best thing to happen to I&amp;S in a long while Join Date: 2002-11-26 Member: 10016Members
    I think we should join together as brothers and fight the large evil that's invading our desktops....

    OS/2 Warp
    BeOS
    and
    MPE (no, not MP3).....

    Together we should work together to stop OS's from making us type
    listf , 2 just to see a directories contents..!!!!!

    <!--emo&;)--><img src='http://www.unknownworlds.com/forums/html//emoticons/wink.gif' border='0' style='vertical-align:middle' alt='wink.gif' /><!--endemo-->

    Sorry I tend to stay out of the way in these discussions... but I had to....
  • Umbraed_MonkeyUmbraed_Monkey Join Date: 2002-11-25 Member: 9922Members
    Nobody said the patch was bad, they said it came out late. Even from a neutral point of view, its odd that a patch for such a "large security hole" (from MS's "Critical" rating) takes so long to make.

    Also, please keep in mind that MS bashing != Linux praising. A lot of these people who bash Microsoft probably cant live without their pirated WinXP. Next time, no one explode on Linux and carry the thread to unholy directions when someone takes a jab at MS.
This discussion has been closed.